This paper presents the ability to use cheap adsorbent (corn leaf) for the removal of Malachite Green (MG) dye from its aqueous solution. A batch mode was used to study several factors, dye concentration (50-150) ppm, adsorbent dosage (0.5-2.5) g/L, contact time (1-4) day, pH (2-10), and temperature (30-60) The results indicated that the removal efficiency increases with the increase of adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature. An SEM device characterized the adsorbent corn leaves. The adsorption's resulting data were in agreement with Freundlich isotherm according to the regression analysis, and the kinetics data followed pseudo-first-order kinetic with a correlation coefficient of 0.9309. The thermodynamic data show that the process is exothermic and reversible. The highest removal of MG was 91%, which gave proof that the corn leaves as adsorbent material have the capability of adsorbing the MG dye for aqueous solutions
Rheumatoid arthritis (RA) is a common inflammatory disease that associated with increased morbidity and mortality due to accelerated atherosclerosis. Rosuvastatin is a unique hydroxy methyl glutaryl Co A (HMGCoA) reductase inhibitor that has anti inflammatory effects.
The aim of this study was to evaluate the effect of rosuvastatin as adjuvant therapy to methotrexate (MTX) on lipid profile and its possible cardioprotective effect in RA patients. A double blinded placebo controlled clinical trial with 8 weeks follow up periods at which 40 patients with active RA using MTX were randomized into 2 groups to receive either rosuvastatin 10mg or placebo as adjuvant therapy to MTX. In addition to twenty healthy subjects as control group.
... Show MoreThe research emphasizes importance of preliminary drawings in design of any product. Therefore, using of simulation as tools for visual thinking in developing drawing and design skills. So that practice of drawing by hand, considering shape of ideas in first stage of visualizations, and practice of its techniques and continuous training.
Hence, the research problem arose with the role of simulation method for developing preliminary sketches in the sample of students of the Product Design Department at the College of Design and Art, PNU, as it is important tool for visual thinking that helps the designer in designing and producing innovative artistic works.
Therefore, the research axes, a number of findings and recommendations were
In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThe area of character recognition has received a considerable attention by researchers all over the world during the last three decades. However, this research explores best sets of feature extraction techniques and studies the accuracy of well-known classifiers for Arabic numeral using the Statistical styles in two methods and making comparison study between them. First method Linear Discriminant function that is yield results with accuracy as high as 90% of original grouped cases correctly classified. In the second method, we proposed algorithm, The results show the efficiency of the proposed algorithms, where it is found to achieve recognition accuracy of 92.9% and 91.4%. This is providing efficiency more than the first method.
: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod
... Show MoreIn this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreBackground: This study aimed to determine the gender of a sample of Iraqi adults using the mesio-distal width of mandibular canines, inter-canine width and standard mandibular canine index, and to determine the percentage of dimorphism as an aid in forensic dentistry. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the mandibular canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; paired sample t-test was used to evaluate the side difference of
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s