The disposal of textile effluents to the surface water bodies represents the critical issue especially these effluents can have negative impacts on such bodies due to the presence of dyes in their composition. Biological remediation methods like constructed wetlands are more cost-effective and environmental friendly technique in comparison with traditional methods. The ability of vertical subsurface flow constructed wetlands units for treating of simulated wastewater polluted with Congo red dye has been studied in this work. The units were packed with waterworks sludge bed that either be unplanted or planted with Phragmites australis and Typha domingensis. The efficacy of present units was evaluated by monitoring of DO, Temperature, COD and dye concentration in the effluents under the variation of detention time (1-5 day) and dye concentration (10-40 mg/L). The maximum removal of dye and COD were 98 and 82% respectively for 10 mg/L of Congo red dye after five-day hydraulic retention time (HRT). The results have shown that the removal of COD and dye concentration significantly increased with higher contact time and lower dye concentration. The values of monitored parameters adopted to evaluate the wastewater quality (i.e. DO, COD and Congo red dye) are satisfied the requirements of irrigation water. The dye concentration variation in the effluent with contact time was formulated efficiently by Grau kinetic model. Functional groups (specified by FT-IR analysis) have a remarkable role in the entrapment of dye on the waterworks sludge bed.
In this research, a simple experiment in the field of agriculture was studied, in terms of the effect of out-of-control noise as a result of several reasons, including the effect of environmental conditions on the observations of agricultural experiments, through the use of Discrete Wavelet transformation, specifically (The Coiflets transform of wavelength 1 to 2 and the Daubechies transform of wavelength 2 To 3) based on two levels of transform (J-4) and (J-5), and applying the hard threshold rules, soft and non-negative, and comparing the wavelet transformation methods using real data for an experiment with a size of 26 observations. The application was carried out through a program in the language of MATLAB. The researcher concluded that
... Show MoreDr. Qahtan Al-Madfa’i’s architecture has been characterized by a particular characteristic that may be unique and extreme at the same time, that is the use of the distinctive three-dimensional structural coverings and the exploitation of structural construction to give an extra aesthetic touch to the composition of the building, to achieve the application of his universal ideas, which he strongly believed and defended.
In the period of the marked urban decline that the country undergoes now, which urges us toward making a comparison between the beginning of the modern Iraqi architecture and its ascending path up to its peak and the periods of its decline until it reached a very
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreIn this paper, the bi-criteria machine scheduling problems (BMSP) are solved, where the discussed problem is represented by the sum of completion and the sum of late work times simultaneously. In order to solve the suggested BMSP, some metaheurisitc methods are suggested which produce good results. The suggested local search methods are simulated annulling and bees algorithm. The results of the new metaheurisitc methods are compared with the complete enumeration method, which is considered an exact method, then compared results of the heuristics with each other to obtain the most efficient method.
In the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show MoreA step to net-zero of carbon dioxide losses in the microalgae cultivation process was targeted in the current study. This research was carried out by using pre-dissolved inorganic carbon (DIC) as a source of carbon with two doses of twenty-five and fifty millilitres.