Adsorption techniques are widely used to remove certain classes of pollutants from waters, especially those that are not easily biodegradable. Dyes represent one of the problematic groups. The removal of methyl green from waste water using bamboo was studied in batch and continuous system. In batch system equilibrium time and adsorption isotherm was studied at different concentrations (5, 10, 15, 20, 25 and 30 ppm) and 50 mg weight of adsorbent.
Langmuir and Freundlich equations were applied for adsorption isotherm data. Langmiur equation was fitted better than Freundlich equation (R2=0.984 for Langmuir equation).The maximum percentage dye removal obtained 79.4% and adsorption capacity was 15.5 mg/g. For continuous system the breakthrough curve was studied at different bed depths (1, 2 and 4 cm), different concentrations (5 and 10 ppm), and different flow rates (5 and 10 ml/min).
In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical
Trickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreThe A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More