Operation of a MEG pilot regeneration system for organic acid and alkalinity removal during MDEA to FFCI switchover
...Show More Authors
Consistent "with the thought of tax talk is unified tax natural evolution for him, as the application leads to the inclusion of tax all branches of income and its sources and through truncated part of this entry through the application of price ascending it, it means the procedures of tax reform. Taxes on total income characterized by giving a clear picture of the total income of the taxpayer and its financial situation and its burden family which allows granting exemptions, downloads, and application of prices that fit this case. This requires reconsideration of the structure of the tax system in force and the transition from a system specific taxes to the tax system on the total income of the integration of income from the rental of re
... Show MoreBackground: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit
... Show MoreThis work aimed to use effective, low-cost, available, and natural adsorbents like eggshells for removal of hazardous organic dye result from widely number of industries and study the influence of different eggshell particle size (75, 150) Mm. The adsorbent was characterized by SEM, EDX, BET and FTIR . The initial pH of dye solutions varying from 4 to 10 , the initial concentrations of methyl violet (MV) 2B range (20-80) mg/L, dosage range (0.5-10) g, contact time (30-180) min, and particles size of the adsorbent (75, 150) Mm were selected to be studied. Two adsorption isotherms models have been used to fit the experimental data. Langmuir and Freunlich models were found to more represent the experiments with high
... Show MoreSamples of Oxytricha falax were collected from Tigris River by 55µ. mesh net. Culturing of O. falax were cultivated in specific conditions (DO 3-5mg/l.; W.Temp. 24±1ºC; pH: 6.8-7.5).The effect of various furfural concentration 0, 20, 40, 80,100 and 124 ppm and toluene concentration 0, 15, 30, 34.2, 34.5 and 35 ppm after two periods of treatment (24 and 48 hr.) on the physiological parameters of O. falax ciliate were observed. This study showed that the lethal concentration of furfural was 124ppm and 80ppm after 24hr. and 48hr. from treatment which killed all the individual community respectively. Furthermore the treatment of O. falax individuals with different concentrations of toluene indicated that 34.5 ppm of it caused disappearance o
... Show MoreA potentiostatic study of the behaviour of Inconel (600) in molar sulphuric acid has been carried out over the temperature range 293-313 K. Values have been established for the potentials and current densities of the corrosion, active-passive transition, passivity and transpassive states. For corrosion, the current density (ic) and potential (Ec) have been determined from well-defined Tafel lines. The potential and current density prior to the commencement of passivity have been obtained corresponding respectively to the critical potential (Ecr( and to the current density (icr) for the active-passive transition state. The passive range was defined by the respective potentials and current densities for passive film formation and dissolutio
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More