In recent years, it has been evident that searching for alternative methods with low-price and eco-friendly features that produce high-quality adsorbents is in high demand. In the present work, Rice husk from Iraqi rice named (Amber) had been used as the primary source to produce rice husk ash (RHA) for the removal of the antibiotic metronidazole (Flagyl) from water. After optimum drying of rice husk, rice husk ash (RHA) was obtained at 600 °C using an electric oven. RHA has been investigated for properties using X-ray diffraction (XRD), porosity, and surface area (SA). The experimental work adsorption data were optimized to evaluate Langmuir and Freundlich constants. The thermodynamic parameters likely a change in Gipp's energy (ΔG), enthalpy (ΔH), and entropy (ΔS). The impacts of increasing temperature on adsorption capacity were investigated, and the results indicate that the pseudo-second-order kinetics model could be presented the dynamic adsorption data that it has. The resultant values for the heat of adsorption and the free energy indicated that adsorption of Flagyl is preferred at low temperatures.
Abstract
The current research aims to identify the typical effect of Flower and Coscroft on expressive performance and the development of lateral thinking among literary fifth-grade students. To achieve the research objective, the researcher chose a sample of (90) female students from the fifth literary grade, with two experimental groups and a control group. The research groups are of six subjects. The research found that the two experimental groups have more expressive performance than the control group. Students of the first experimental group outperformed the students of the second experimental group in expressive performance and lateral thinking tests. In light of the findings of the research, the researcher
... Show MoreThis research aims to create lightweight concrete mixtures containing waste from local sources, such as expanded polystyrene (EPS) beads and waste plastic fibers (WPFs), all are cheap or free in the Republic of Iraq and without charge. The modern, rigid, and mechanical properties of LWC were investigated, and the results were evaluated. Three mixtures were made, each with different proportions of plastic fibers (0.4%, 0.8%, 1.2%), in addition to a lightweight concrete mixture containing steak fibers (0.4%, 0.8%, 1.2%), in addition to a lightweight concrete mixture. It contains 20% EPS. The study found that the LWC caused by the addition of WPFs reduced the density (lightweight) of the concrete mixtures because EPS tends
... Show MoreBirds of prey (Raptors) are top predator avian species that many migrate annually through Mesopotamian marshes in southern Iraq toward their wintering grounds in Arabia and Africa, while others are breeding residents; however, information on their current status is scarce. From January 2016 to April 2019, a total of 20 field expeditions were conducted in the geographical zone of the Mesopotamian marshes, wetlands of international importance. The survey covered the Central Marshes, Al-Hammar and Hawizeh Marsh. One of the objectives of the field surveys is to list the raptors species that wintering and/or migrating through the Mesopotamian marshes and to understand their current spatial and temporal distribution. In the present study, a to
... Show MoreUnderstanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More