Adsorption capacity of a waste biomass, date stones, for phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) was investigated. The characteristics of such waste biomass were determined and found to have a surface area and iodine number of 495.71 m²/g and 475.88 mg/g, respectively. The effects of temperature, initial sorbate concentration, and contact time on the adsorption process were studied. Experimental equilibrium data for adsorption of Ph and PNPh on date stones were analyzed by the Langmuir, Freundlich and Sips isotherm models. The results show that the best fit was achieved with the Sips isotherm equation with maximum adsorption capacities of 147.09 and 179.62 mg/g for Ph and PNPh, respectively. The kinetic data were fitted to pseudo-first order, pseudo-second order and intraparticle diffusion models, and was found to follow closely the pseudo-second order model for both Ph and PNPh. The calculated thermodynamic parameters, namely AG, AH, and AS showed that adsorption of Ph and PNPh onto date stones was spontaneous and endothermic under examined conditions.
In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
This research deals with the concept of space in the theatrical performance and how the director works between two different spaces, the closed space and the open space. The question was how to use space according to the director's vision in the presentation. The problem of the research was whether the director of the Iraqi filmmaker could see the variable in the architectural space Or the place or space within the exhibition between open and closed, through the formation of the vision of the external components of intellectual and aesthetic and aesthetic, and impact on the relationship between the actor and the recipient to produce a new aesthetic space, and then the purpose of research and importance and limits and terminology The seco
... Show MoreBacterial meningitis is a leading cause of illness and death worldwide. It is crucial for clinical and public health care, as well as disease control, to identify the meningitis-causing agent promptly. Between June 2021-February 2022, a total of 100 cerebrospinal fluid (CSF) and blood samples were collected from suspected cases of meningitis admitted to Raparin Paediatric Teaching Hospital, Erbil city-Iraq. Cytochemical, cultural, and biochemical tests were conducted, and confirmed by molecular techniques. Bacterial culture findings were positive in 7% of CSF samples and just one positive among blood samples. The most common pathogens found by cultural characteristics and VITEK 2 Compact System were Staphylococcus sciuri in two
... Show MoreThe oil exports play a vital role in supporting economic development and raise the economic growth. The oil exports can increase the economic growth via three main channels which are supporting the productive, distributive and service sectors; increasing the investment and capital formation; and increasing the employment rate.
However, the oil exports did not have an important role in increasing the economic growth in Iraq. Therefore, it also did not provide the required support to other economic sectors, neither participated in increase the employees’ skills nor increase the investment rate. It may slightly contribute in enhancement the infrastructure that can attract the public and private investments
... Show Morenouns , because deriving these names will lead to eternity which is impossible, and restrict the derivation only in agent nouns from their verbs, and the adjective names from their adjectives with the condition of truth in derivation.
The derivation of “Allah” names was denied due to a creed thoughts, because saying that “Allah” names is derived will not describe the eternal essence of “Allah”, and if it were derived this will make “Allah” is a Compound from his essence and Attributes.
The Al-Zaher people had recant the derivation of the agent nouns by preventing the derivation of “Allah” names because it will make “Allah” is a Compound from his essence and Attributes.
The Al-Zaher people had recant from
In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreWhen soft tissue planning is important, usually, the Magnetic Resonance Imaging (MRI) is a medical imaging technique of selection. In this work, we show a modern method for automated diagnosis depending on a magnetic resonance images classification of the MRI. The presented technique has two main stages; features extraction and classification. We obtained the features corresponding to MRI images implementing Discrete Wavelet Transformation (DWT), inverse and forward, and textural properties, like rotation invariant texture features based on Gabor filtering, and evaluate the meaning of every
... Show MoreAdverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show More