The removal of direct blue 71 dye from a prepared wastewater was studied employing batch electrocoagulation (EC) cell. The electrodes of aluminum were used. The influence of process variables which include initial pH (2.0-12.0), wastewater conductivity (0.8 -12.57) mS/cm , initial dye concentration (30 -210) mg/L, electrolysis time (3-12) min, current density (10-50) mA/cm2 were studied in order to maximize the color removal from wastewater. Experimental results showed that the color removal yield increases with increasing pH until pH 6.0 after that it decreased with increasing pH. The color removal increased with increasing current density, wastewater conductivity, electrolysis time, and decreased with increasing the concentration of initial dye. The maximum color removal yield of 96.5% was obtained at pH 6.0, wastewater conductivity 9.28 mS/cm , electrolysis time 6 min ,the concentration of initial dye 6 0 mg/L and current density 30 mA/cm2 .
he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MorePreserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids.
... Show MoreDelays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.