The current study was to examine the reliability and effectiveness of using most abundant, inexpensive waste in the form of scrap raw zero valent aluminum ZVAI and zero valent iron ZVI for the capture, retard, and removal of one of the most serious and hazardous heavy metals cadmium dissolved in water. Batch tests were conducted to examine contact time (0-250) min, sorbent dose (0.25-1 g ZVAI/100 mL and 2-8 g ZVI/100 mL), initial pH (3-6), pollutant concentration of 50mg/L initially, and speed of agitation (0-250) rpm . Maximum contaminant removal efficiency corresponding to (90 %) for cadmium at 250 min contact time, 1g ZVAI/ 6g ZVI sorbent mass ratio, pH 5.5, pollutant concentration of 50 mg/L initially, and 250 rpm agitation speed were obtained. Langmuir and Freundlich isotherms were presumed to fit the batch kinetics data for the sorption of Cd(II) onto ZVAI and/or ZVI and found that Langmuir (I) was the most representative model type with coefficient of determination R2 greater than 0.9115. Kinetics data for the sorption of Cd(II) onto ZVAI/ZVI mixture and due to the good agreement between the fitted and the experimental results; the data was found to obey the pseudo second order model. The scanning electron microscopy (SEM) for the ZVI and ZVAI was conducted before and after the sorbent-liquid reaction and revealed distinct morphological changes in the sorbent surface due to the contaminant saturation and pore channel blockages that ceased the sorption process.
Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreDevelopment of improved methods for the synthesis of metal oxide nanoparticles are of high priority for the advancement of material science and technology. Herein, the biosynthesis of ZnO using hydrahelix of beta vulgaris and the seed of abrus precatorius as an aqueaus extracts adduced respectivily as stablizer and reductant reagent. The support are characterized by spectroscopic methods ( Ft-IR, Uv-vis ).The FTIR confirmed the presence of ZnO band. The Uv-visible showed absorption peak at corresponds to the ZnO nanostructures. X-ray diffraction, scaning electron microscopy (SEM), dispersive X-ray spectroscopy (EDX) techniques are taken to investigation the size, structure and composition of synthesised ZnO nanocrystals. The XRD pattern mat
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show MoreBackground: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit
... Show MoreThis study was included preparing acold aqueous extract of clove buds The study also comprised the isolation and studying the proteinous compound,which was seperated using gel filtration technique and determined approximately molecular weight of this isolated compound(6799) dalton . The aim of the study demonstrate effects of the crude aqueous, non proteinous extract, proteinous precipitate and proteinous compound on serum glucose, total cholesterol, triglyceride and high density lipoprotein-cholesterol levels, also glutathione and malondialdehyde levels in liver and kidney tissues in diabetic mice-induced alloxan.Extracts were administerated interaperitioneally. The results were indicated that the crude aqueous, non proteinous extr
... Show More