In this work, microbubble dispersed air flotation technique was applied for cadmium ions removal from wastewater aqueous solution. Experiments parameters such as pH (3, 4, 5, and 6), initial Cd(II) ions concentration (40, 80, and 120 mg/l) contact time( 2, 5, 10 , 15, and 20min), and surfactant (10, 20and 40mg/l) were studied in order to optimize the best conditions .The experimental results indicate that microbubbles were quite effective in removing cadmium ions and the anionic surfactant SDS was found to be more efficient than cationic CTAB in flotation process. 92.3% maximum removal efficiency achieved through 15min at pH 5, SDS surfactant concentration 20mg/l, flow rate250 cm3/min and at 40mg/l Cd(II) ions initial concentration. The removal efficiency of cadmium ion was predicted through 11 neurons hidden layer, with a correlation coefficient of 0.9997 between ANN outputs and the experimental data and through sensitivity analysis, pH was found to be most significant parameter (25.13 %).The kinetic flotation order for cadmium ions almost first order and the removal rate constant (k) increases with decreasing the initial metal concentration.
The permeable reactive barrier (PRB) is one of the promising innovative in situ groundwater remediation technologies, in removing of copper from a contaminated shallow aquifer. The 1:1- mixture of waste foundry sand (WFS) and Kerbala’s sand (KS) was used for PRB. The WFS was represented the reactivity material while KS used to increase the permeability of PRB only. However, Fourier-transform infrared (FTIR) analysis proved that the carboxylic and alkyl halides groups are responsible for the sorption of copper onto WFS. Batch tests have been performed to characterize the equilibrium sorption properties of the (WFS+KS) mix in copper- containing aqueous
solutions. The sorption data for Cu+2 ions, obtained by batch experiments, have be
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreIn this paper , concrete micro-piles were used to improve the bearing capacity of the soil which is supporting the shallow foundation by using groups of (4; 6 and 9)bored short micro-piles which have, (D=0.125m and D=0.1m), and length to diameter ratio (L/D) equal to (6; 10 and 12) respectively. To calculate the bearing capacity of the micro-piles,(Tomlinson) and (Lamda) methods were used; also the soil properties were taken from Al-Muthana airport,(Al-Qyssi,2001) [1]. The results show that; increasing the number of piles and/ or the diameters and lengths; and the interaction between the bearing capacity of the shallow foundation with the bearing capacity of the pile group which leads to increasing the strength against the external loads
... Show MoreNowadays nanoparticles are used in many fields of life all over the world, and there are numerous ways to obtain them: chemical, physical and biological processes. In recent times, the biological method for the synthesis of nanoparticles associated with using plant extract is widely spread. Optimal conditions for synthesis of silver nanoparticles using aqueous seeds extract of Myristica fragrance were highlighted in this research, such as type of plant extract, weight of extracted plant material, volume ratio of plant extract to AgNO3 and temperature of reaction. The study proved that the optimal status for AgNPs synthesis by using 10 g of M. fragrance seeds powder were added to 100 mL boiled distilled water, then homogenized and f
... Show MoreNowadays nanoparticles are used in many fields of life all over the world, and there are numerous ways to obtain them: chemical, physical and biological processes. In recent times, the biological method for the synthesis of nanoparticles associated with using plant extract is widely spread. Optimal conditions for synthesis of silver nanoparticles using aqueous seeds extract of Myristica fragrance were highlighted in this research, such as type of plant extract, weight of extracted plant material, volume ratio of plant extract to AgNO3 and temperature of reaction. The study proved that the optimal status for AgNPs synthesis by using 10 g of M. fragrance seeds powder were added to 100 mL boiled distilled water, then homogenized and filt
... Show MoreIn this article the conventional "solid-state reaction" method was used to synthesize perovskite Li0.4Cd0.6Ba2Ca2Cu3O10+δ. Four main types of compounds were obtained by physically replacing calcium oxide with cadmium in proportions 0, 0.03, 0.06 and 0.09, the pure Li0.4Cd0.6Ba2Ca2Cu3O10+δ phase, and the phases Li0.4Cd0.6Ba2Ca1.97Cd0.03Cu3O10+δ
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show More