The removal of boron from aqueous solution was carried out by electrocoagulation (EC) using magnesium electrodes as anode and stainless steel electrodes as cathode. Several operating parameters on the removal efficiency of boron were investigated, such as initial pH, current density, initial boron ion concentration, NaCl concentration, spacing between electrodes, electrode material, and presence of carbonate concentration. The optimum removal efficiency of 91. 5 % was achieved at a current density of 3 mA/cm² and pH = 7 using (Mg/St. St. ) electrodes, within 45 min of operating time. The concentration of NaCl was o. 1 g/l with a 0.5cm spacing between the electrodes. First and second order rate equation were applied to study adsorption kinetics. The adsorption process
follows second order kinetic model with good correlation. The energy consumption was evaluated for the optimum operating conditions. It was in the range of 1.296 to 1.944 Kwh/m3 . The overall expected increase in the operating cost of water treatment using membrane desalination facility (for example) will be about 20%.
The researchers in this study, which aimed to find out Degree contribution of Iraqi
women in development from the perspective faculty members of the complex Jadriya
University in Baghdad, and the the impact of demographic variables (gender, college, place of
living, school level,) for its contribution.
The study population consisted of some faculty members Jadiriyah compound in
Baghdad's University for the academic year 20012/2013. This study followed a descriptive
approach the field, and the analytical method, the study sample consisted of (250) teaching all
of College of Science for girls and education for girls, and to achieve objective of the study
was the development of a questionnaire, was sure of its sincer
This study evaluated the extent to which obturation materials bypass fractured endodontic instruments positioned in the middle and apical thirds of severely curved simulated root canals using different obturation techniques. Sixty resin blocks with simulated root canals were used, each with a 50° curvature, a 6.5 mm radius of curvature, and a length of 16.5 mm, prepared to an ISO #15 diameter and taper. Canals were shaped using ProTaper Universal files (Dentsply Maillefer) attached to an X-smart Plus endo motor (Dentsply), set at 3.5 Ncm torque and 250 rpm, up to size S2 at working length. To simulate fractures, F2 and F3 files were weakened 3 mm from the tip, then twisted to break in the apical and middle sections of the canal, re
... Show MoreBackground: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be
... Show MoreThe present study refers to a ready-made three components epoxy based paint made by the Modern Paints Industries Company (Al-Za'farania, Baghdad) subjected to several tests in order to improve its specifications by optimizing the application conditions. The paint components are under the trade names: Resin (D-5547), Hardener (H-1457) and Thinner (P-851). The paint is used for painting drinking water reservoirs from inside.
This research examines how Al-Sabah newspaper addressed violations of women’s rights in Iraq. Using content analysis, a sample of 157 articles published from July 1, 2021, to December 31, 2021, was analyzed. The study reveals diverse journalistic treatments, with interpretive approaches employed in addressing violations of Iraqi women’s rights. Social violations of women’s rights were the primary focus, and various forms of newspaper articles, including opinion pieces, were commonly used.
A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.