The removal of boron from aqueous solution was carried out by electrocoagulation (EC) using magnesium electrodes as anode and stainless steel electrodes as cathode. Several operating parameters on the removal efficiency of boron were investigated, such as initial pH, current density, initial boron ion concentration, NaCl concentration, spacing between electrodes, electrode material, and presence of carbonate concentration. The optimum removal efficiency of 91. 5 % was achieved at a current density of 3 mA/cm² and pH = 7 using (Mg/St. St. ) electrodes, within 45 min of operating time. The concentration of NaCl was o. 1 g/l with a 0.5cm spacing between the electrodes. First and second order rate equation were applied to study adsorption kinetics. The adsorption process
follows second order kinetic model with good correlation. The energy consumption was evaluated for the optimum operating conditions. It was in the range of 1.296 to 1.944 Kwh/m3 . The overall expected increase in the operating cost of water treatment using membrane desalination facility (for example) will be about 20%.
The chlorine concentration variation in Baghdad water networks was studied. The
chlorine data were collected from Mayoralty of Baghdad and Ministry of Environment
(MOE) for the networks for both sides of the city Karkh and Rasafa for (2008-2009). The
study of these data indicates that there are no systematic testing program .Classified GIS
maps showed that the areas far from the treatment plants have almost always low
chlorine concentration .This indicates that the problem of the low chlorine concentration
in the far areas is due to cracks of pipe along the conveyance path ,as expected. The area's
most frequently have low concentration are Al-sadir,Al-Kadhimya, and Al-Amiria . It
was found also that the chlorine c
Due to severe scouring, many bridges failed worldwide. Therefore, the safety of the existing bridge (after contrition) mainly depends on the continuous monitoring of local scour at the substructure. However, the bridge's safety before construction mainly depends on the consideration of local scour estimation at the bridge substructure. Estimating the local scour at the bridge piers is usually done using the available formulae. Almost all the formulae used in estimating local scour at the bridge piers were derived from laboratory data. It is essential to test the performance of proposed local scour formulae using field data. In this study, the performance of selected bridge scours estimation formulae was validated and sta
... Show MoreThe establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan
... Show MoreThe corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )
... Show MoreThe aim of the present study was to isolated the Enterococcus spp. from milk samples of cow and vaginal swabs from aborted women and patient women in Baghdad during September 2016 to april 2017. All 100 milk sample collecting was carried out on California Mastitis Test (CMT) and the positive Percentage of CMT reactions was 5% and the percentage of Enterococcus isolates from mastitic milk was 60% and 30% from nonmasitic milk. The prevalence of Enterococcus spp was 31% of milk samples and the prevalence of Enterococcus spp. Isolates were 67.74% of the isolates of cow milk samples were Enterococcus faecalis, 25.80% was Group D and 6.45% was non groupable while Enterococcus spp. isolates from aborted women samples were 20% and all isolated was
... Show MoreA many risk challenge in (settings hospital) are multi- bacteria are antibiotic-resistant. Some type strains that ability adhesion surface-attached bio-film census. Fifteen MRSA isolates were considered as high biofilm producers Moreover all MRSA isolates; M3, M5, M7 and M11 produced biofilms but the thickest biofilm seen M7strain. The MIC values of N. sativa oil against clinical isolates of MRSA were between (0.25, 0.5, 0.75, 1.0) μg/ml While MRSAcin (50, 75, 100, 125) µg\ ml. All biofilms treated with MRSAcin and Nigella sativa developed a presence of live cells after cultured on plate agar with inhibition zone between MIC (18 – 15) and (14- 11)mm respectively.Yet, results showed that MRSA supernatant developed a inhibitory ef
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show More