In this paper flotation method experiments were performed to investigate the removal of lead and zinc. Various parameters such as pH, air flow rate, collector concentrations, collector type and initial metal concentrations were tested in a bubble column of 6 cm inside diameter. High recoveries of the two metals have been obtained by applying the foam flotation process, and at relatively short time 45 minutes . The results show that the best removal of lead about 95% was achieved at pH value of 8 and the best removal of zinc about 93% was achieved
at pH value of 10 by using 100 mg/l of Sodium dodecylsulfate (SDS) as a collector and 1% ethanol as a frother. The results show that the removal efficiency increased with increasing initial metal concentrations in the alkaline conditions while it decreased in the acidic condition. Increasing air flow rate up to 1000 ml/min enhanced the separation efficiency. Selective flotation experiments were also conducted in the presence of metalion mixture solutions. It was possible to separate lead and zinc under suitable condition, successful removals reached about 84% and 81% for lead and zinc respectively . It was observed that the first order equation fitted the data as good and better than any of the other equations.
This study included the extraction properties of spatial and morphological basins studied using the Soil and Water Assessment Tool (SWAT) model linked to (GIS) to find the amount of sediment and rates of flow that flows into the Haditha reservoir . The aim of this study is determine the amount of sediment coming from the valleys and flowing into the Haditha Dam reservoir for 25 years ago for the period (1985-2010) and its impact on design lifetime of the Haditha Dam reservoir and to determine the best ways to reduce the sediment transport. The result indicated that total amount of sediment coming from all valleys about (2.56 * 106 ton). The maximum annual total sediment load was about (488.22 * 103 ton) in year 1988
... Show MoreIn this work, new Schiff bases of quinazolinone derivatives (Q1-Q5) were synthesized from methyl anthranilate. The synthesis involved three steps. In the first step, methyl anthranilate was reacted with isothiocyanatobenzene, producing the thiourea derivative K1. The second step entailed reacting K1 with hydrazine hydrate, synthesizing 3-amino-2-(phenylamino) quinazolin-4(3H)-one (K2). The third step involved reaction of K2 with various aromatic aldehydes, yielding the Schiff bases derivatives Q1-Q5. The chemical structures of these compounds were identified by FT-IR,1H NMR and 13C NMR spectroscopy. The newly synthesized derivatives (Q1-Q5) were subjected to rigorous evaluation to assess their efficacy as corrosion inhibitors for ca
... Show MoreThis study aimed to reveal the stage for teachers of basic training needs from the perspective of workers in Mafraq Governorate, through a survey of a sample of counselors look at the Ajloun area schools reached (58) counselors.
To achieve the objective of the study was constructed questionnaire where they are finalized (18) items distributed on two dimensions (professional needs, performance requirements) and after confirmation of the validity and reliability have been applied to the sample where the results showed that training needs were high, both on a professional or per formative level .
The results also showed no statistically significant differences in the areas of tool due to gender, educational qualification. The study co
This study aims to show the effectiveness of immobilization of Chlorella green algae biomass in the form of bead for the removal of lead ions from synthetic polluted water at various operational parameters such as pH (2–6), biosorbent dosage (0.5–20 g/L) and initial concentration (10–100 mg/L). More than 90 % removal efficiency was achieved. FTIR and SEM-EDX analysis of the biosorbent before and after sorption show differences in the functional groups on the adsorbent surface. Langmuir and Freundlich equilibrium isotherm, pseudo-first-order and pseudo-second-order kinetic models were applied to the experimental and results and show good conformity with Langmuir isotherm model and pseudo-second-order kinetic model with c
... Show MoreIn this research investigation, a total of eighteen diverse tetra- and penta-lateral cyclic compounds were synthesized. These included 1,3,4-thiadiazole, thiazolidin-4-one (via an alternative method), 1,2,4-triazole, carbothioamide, thiazole-4-one, azetidin-2-one, and oxazole. The synthesis procedure entailed a sequence of reactions. The thiazolidine-4-one 1 was obtained by reaction p-aminobenzoic acid with thiosemicarbazide, followed by treatment with p-tolualdehyde to produce Schiff base 2. Reaction Schiff base 2 with mercaptoacetic acid in dry benzene was carried out to produce thiazolidine-4-one 3. In another synthesis pathway, the esterification of p-nitro benzoic acid with ethanol in the presence of sulfuric acid was
... Show MoreThe mucilage was isolated from mustard seeds and identification by some different methods like, thermo gravimetric, FTlR., X-ray powdered, proton NMR, FTIR spectra of the three gums contain different functional group in the gums, major peaks bands noticed were belong to OH (3410.15 – 3010.88) group from hydroxyl group, CH aliphatic (2925-2343.51), C-O (1072.42-1060.85) group and C=O 1743.65, Thermo chemical parameters of mucilage was evaluated and compared with the standard gums, Results indicated the mucilage was decomposed in 392°C and mass loss 55%, The X ray process found the mucilage had single not sharp peak
... Show MoreThe study involved isolation and characterization of E.coli from patient’s infected with diarrhea , in order to study the ability of the bacteria to produce cytosine deaminase (CD). Result showed eight isolates of E.coli which showed adifference in the production of (CD) and the isolate of E. coli E33 was the beast of its production of CD than the other’s and the value of the specific activity was 4.920 u/mg protein , when grown in the medium which contains 1% glycerol ,3% peptone as a source of Carbon and Nitrogen respectively with pH 8. The optimum cultural condition‘s for the production of CD from E. coli E33 was studied the result‘s showed that the isolate gave the
... Show MoreAbstract
This study is aim to :
- Put a standard to evaluate the altruistic behavior in kindergarten children.
- Know level of the altruistic behavior in the kindergarten children according to their mother "s points of view.
- Know the level of the altruistic behavior in the kindergarten children according to their teacher "s points of view.
- The differences in the level of altruistic behavior in kindergarten children between their mothers & teachers points of view.
The sample consists of (120) children of kindergarten children in Baghdad. The researcher has built a to
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More