Effluent from incompetent wastewater treatment plants (WWTPs) contains a great variety of pollutants so support water treatments are essential. The present work studies the removal of phosphate species from aqueous solutions by adsorption on to spherical Calcined Sand -Clay mixture (CSCM) used a natural, local and low-cost adsorbent. Batch experiments were performed to estimate removal efficiency of phosphate. The adsorption experiments were carried out as function of pH, dose of adsorbent, initial concentration, temperature and time of adsorption. The efficient removal was accomplished for pH between 10 and 12. The experimental results also showed that the removal of phosphate by (CSCM) was rapid (the % removal 98.9%, 92%, 90%, 89% in 60 min) when the initial phosphate concentrations were at 5, 10, 15, 20 mg/l, respectively at optimum PH 10-12 and optimum dose was 5 gm/200ml. The adsorption process is time dependent. Thermodynamic studies showed that phosphate adsorption was exothermic. The effect of temperature range of 15-30 °C has been investigated. The results indicated that the temperature significantly affected phosphate adsorption on (CSCM) adsorbent. Langmuir and Freundlich isotherms models indicated that both isotherms were proper to describe the adsorption characteristics of (CSCM), with Langmuir being more fit. Adsorption capacity of phosphate had equal to 0.835 mg phosphorous/g adsorbent. The study reveal that calcined sand-clay mixture is an excellent low cost material for phosphate removal in wastewater treatment process .
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreGas and Downhole Water Sink, Gravity Drainage, GDWS-AGD, Enhance the Recovery of Oil
Objective: This experiment was conducted to study the effects of ionized water on certain egg quality traits and the levels of proteins and enzymes in the blood of the Japanese quail Coturnix japonica . Materials and Methods: One hundred 42-day-old quail were randomly distributed among five treatment groups with four replicates for each group. The following treatments were used: T1 (control): The birds were provided normal water, T2: The birds were provided alkaline water (pH = 8), T3: The birds were provided alkaline water (pH = 9), T4: The birds were provided acidic water (pH = 6) and T5: The birds were provided acidic water (pH = 5). A Complete Randomized Design (CRD) was used to investigate the effects of the studied treatments on diffe
... Show MoreThere are many techniques that can be used to estimate the spray quality traits such as the spray coverage, droplet density, droplet count, and droplet diameter. One of the most common techniques is to use water sensitive papers (WSP) as a spray collector on field conditions and analyzing them using several software. However, possible merger of some droplets could occur after they deposit on WSP, and this could affect the accuracy of the results. In this research, image processing technique was used for better estimation of the spray traits, and to overcome the problem of droplet merger. The droplets were classified as non-merged and merged droplets based on their roundness, then the merged droplets were separated based on the average non-m
... Show More