In developing countries, conventional physico-chemical methods are commonly used for removing contaminants. These methods are not efficient and very costly. However, new in site strategy with high treatment efficiency and low operation cost named constructed wetland (CW) has been set. In this study, Phragmites australis was used with free surface batch system to estimate its ability to remediate total
petroleum hydrocarbons (TPH) and chemical oxygen demand (COD) from Al-Daura refinery wastewater. The system operated in semi-batch, thus, new wastewater was weekly added to the plant for 42 days. The results showed high removal percentages (98%) of TPH and (62.3%) for COD. Additionally, Phragmites australis biomass increased significantly during experiment period with 60% increasing in wet weight. These results proved the ability of Phragmites australis to tolerance in contaminant environment and enhanced biodegradation of TPH. Two kinetic models were used, and pseudo-second order was fitted to data with R2 of 0.999.
Central and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
Energy use is second to staffing in building operating costs. Sustainable technology in the energy sector is based on utilizing renewable sources of energy such as solar, wind, glazing systems, insulation. Other areas of focus include heating, ventilation and air conditioning; novel materials and construction methods; improved sensors and monitoring systems; and advanced simulation tools that can help building designers make more energy efficient choices. The objective of this research is studying the effect of insulations on energy consumption of buildings in Iraq and identifying the amount of energy savings from application th
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreThe control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.
Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature show its importance in strengthening financial and operationl
... Show MoreThis study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.
The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.
A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage
... Show MoreThe Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century. During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.
The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two
... Show MoreSami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreSuperconducting compound Bi2Sr2-xYxCa2Cu3O10+δ were Synthesized by method of solid state reaction, at 1033 K for 160 hours temperature of the sintering at normal atmospheric pressure where substitutions Yttrium oxide with Strontium. When Y2O3 concentration (0.0, 0.1, 0.2, 0.3, 0.4 and 0.5). All specimens of Bi2Sr2Ca2Cu3O10+δ superconducting compounds were examined. The resistivity of electrical was checked by the four point probe technique, It was found th