The sorption of Cu2+ ions from synthetic wastewater using crushed concrete demolition waste (CCDW) which collected from a demolition site was investigated in a batch sorption system. Factors influencing on sorption process such as shaking time (0-300min), the initial concentration of contaminant (100-750mg/L), shaking speed (0-250 rpm), and adsorbent dosage (0.05-3 g/ml) have been studied. Batch experiments confirmed that the best values of these parameters were (180 min, 100 mg/l, 250 rpm, 0.7 g CCDW/100 ml) respectively where the achieved removal efficiency is equal to 100%. Sorption data were described using four isotherm models (Langmuir, Freundlich, Redlich-Peterson, and Radke-Prausnitz). Results proved that the pure adsorption and precipitation are the main mechanisms for removal of copper ions from aqueous solution onto CCDW and sorption data can be represented by Langmuir and Radke-Prausnitz model. The copper ion was successfully removed from aqueous solution during batch experiments using CCDW in the particle size range 2–1 mm. Scanning electron microscopy detected that the removal of Cu2+ was found to arise from surface precipitation.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreTwo compounds,[2-amino-4-(4-nitro phenyl) 1,3-thiazole],(4) and [2-amino-4-(4-bromo phenyl) 1,3-thiazole],(5), were synthesized by refluxing thiourea (1) with each of para-ntiro and para-bomophanacyl bromides(2) and (3) respectively, in absolute methanol. Then, by reaction of [5] with 3,5-dinitrobenzoyl chloride in dimethylformamide (DMF) yielded (6) .On the other hand, reaction of (4) with chloroacetyl chloride in dry benzene afforded (7), which is upon treatment with thiourea in absolute methanol, af
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreAbstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
This study aims to formulate an alternative solution for Formalin for preserving fish as study specimens for long periods. The main reason for finding a solution instead of formalin is to get rid of the negative effects of this solution on those who work with it, as well as to better preserve the bodies of fish. Hence, three new solutions were proposed to replace formalin. Thus, Formalin, in turn, may enter the composition of a small part of these solutions to give better results and for long periods of keeping specimens. All solutions prepared in this study participated in being acidic as in formalin. Two solutions succeeded in compensating for the use of formalin in preserving fish
In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More