Heavy metals especially lead (Pb), cadmium (Cd), chromium (Cr) and copper (Cu) are noxious pollutants with immense health hazards on living organisms, these pollutants enter aquatic environment in Iraq mainly Tigris and Euphrates rivers via waste water came from different anthropological activities, This study investigated capacity of dried and ground root of water hyacinth (Eichhornia crassipes) in removing the heavy metals from their aqueous solutions. Effects of initial concentrations of the heavy metals and pH of their aqueous solutions were studied. Results of this study revealed excellent biosorption capacity of water hyacinth root in general, removal of Pb was the highest and Cr was lowest. The results showed that the Pb, Cu and Cr removal increased as their initial concentrations increased, with maximum removal of Pb and Cu was in 1000 ppm 99.66% and 96.63% respectively and 85% was the maximum removal of Cr in 750 ppm, in contrast Cd maximum removal was in 250 ppm and the adsorption decreased as initial concentrations increased. Removal of Pb, Cu and Cr was maximum with pH 4 and 5, while Cd removal was maximum with pH 8. This study paves the way to use water hyacinth in many applications to remove the heavy metals especially in waste water treatment plants.
With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreThe road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examin
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Urbanization led to significant changes in the properties of the land surface. That appends additional heat loads at the city, which threaten comfort and health of people. There is unclear understanding represent of the relationship between climate indicators and the features of the early virtual urban design. The research focused on simulation capability, and the affect in urban microclimate. It is assumed that the adoption of certain scenarios and strategies to mitigate the intensity of the UHI leads to the improvement of the local climate and reduce the impact of global warming. The aim is to show on the UHI methods simulation and the programs that supporting simulation and mitigate the effect UHI. UHI reviewed has been conducted the for
... Show MoreThe aim of this paper is to propose a reliable iterative method for resolving many types of Volterra - Fredholm Integro - Differential Equations of the second kind with initial conditions. The series solutions of the problems under consideration are obtained by means of the iterative method. Four various problems are resolved with high accuracy to make evident the enforcement of the iterative method on such type of integro differential equations. Results were compared with the exact solution which exhibits that this technique was compatible with the right solutions, simple, effective and easy for solving such problems. To evaluate the results in an iterative process the MATLAB is used as a math program for the calculations.
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show More<span lang="EN-US">This paper presents the comparison between optimized unscented Kalman filter (UKF) and optimized extended Kalman filter (EKF) for sensorless direct field orientation control induction motor (DFOCIM) drive. The high performance of UKF and EKF depends on the accurate selection of state and noise covariance matrices. For this goal, multi objective function genetic algorithm is used to find the optimal values of state and noise covariance matrices. The main objectives of genetic algorithm to be minimized are the mean square errors (MSE) between actual and estimation of speed, current, and flux. Simulation results show the optimal state and noise covariance matrices can improve the estimation of speed, current, t
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe process of controlling a Flexible Joint Robot Manipulator (FJRM) requires additional sensors for measuring the state variables of flexible joints. Therefore, taking the elasticity into account adds a lot of complexity as all the additional sensors must be taken into account during the control process. This paper proposes a nonlinear observer that controls FJRM, without requiring equipment sensors for measuring the states. The nonlinear state equations are derived in detail for the FJRM where nonlinearity, of order three, is considered. The Takagi–Sugeno Fuzzy Model (T-SFM) technique is applied to linearize the FJRM system. The Luenberger observer is designed to estimate the unmeasured states using error correction. The develop
... Show More