In this paper flotation method experiments were performed to investigate the removal of lead and zinc. Various parameters such as pH, air flow rate, collector concentrations, collector type and initial metal concentrations were tested in a bubble column of 6 cm inside diameter. High recoveries of the two metals have been obtained by applying the foam flotation process, and at relatively short time 45 minutes . The results show that the best removal of lead about 95% was achieved at pH value of 8 and the best removal of zinc about 93% was achieved
at pH value of 10 by using 100 mg/l of Sodium dodecylsulfate (SDS) as a collector and 1% ethanol as a frother. The results show that the removal efficiency increased with increasing initial metal concentrations in the alkaline conditions while it decreased in the acidic condition. Increasing air flow rate up to 1000 ml/min enhanced the separation efficiency. Selective flotation experiments were also conducted in the presence of metalion mixture solutions. It was possible to separate lead and zinc under suitable condition, successful removals reached about 84% and 81% for lead and zinc respectively . It was observed that the first order equation fitted the data as good and better than any of the other equations.
Background: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreThis study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreThis study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreTwo- dimensional numerical simulations are carried out to study the elements of observing a Dirac point source and a Dirac binary system. The essential features of this simulation are demonstrated in terms of the point spread function and the modulation transfer function. Two mathematical equations have been extracted to present, firstly the relationship between the radius of optical telescope and the distance between the central frequency and cut-off frequency of the optical telescope, secondly the relationship between the radius of the optical telescope and the average frequency components of the modulation transfer function.
Gas lift is one of the artificial lift techniques which it is frequently implemented to raise oil production. Conventionally, the oil wells produce depending on the energy of reservoir pressure and solution gas which declines due to continuous production. Therefore, many oil wells after a certain production time become unable to lift oil to the surface. Thus, the continuity of production requires implementation of gas lift which works to decrease the average fluid density in the tubing by injection gas through the annulus into the tubing. This paper aims to get maximum oil production of an Iraqi giant oil field at optimum injected gas rate. The field is located in south of Iraq and in
Mass transfer has been studied at rotating cylinder electrodes fabricated with spiral-wound woven-wire meshes using reduction of copper as a test reaction. The experimental data were correlated by an empirical expression between the Sherwood number and the Reynolds number, both regarding the hydraulic diameter as a characteristic length. It was found that the Sherwood number was dependent upon the Reynolds number to the power of 0.521. An enhancement factor was adopted to compare the efficiency of the new rotating cylinder electrode with previous three-dimensional rotating cylinder electrodes. The results showed that the new type has a mass-transfer enhancement factor 2.3 times higher than those obtained with smooth rotating cylinder electr
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More