Removing Congo red (CR) is critical in wastewater treatment. We introduce a combination of electrocoagulation (EC) and electro-oxidation (EO) to address the elimination of CR. We also discuss the deposition of triple oxides (Cu–Mn–Ni) simultaneously on both anodic and cathodic graphite electrodes at constant current density. These electrodes efficiently worked as anodes in the EC-EO system. The EC-CO combination eliminated around 98 % of the CR dye and about 95 % of the Chemical Oxygen demand (COD), and similar results were obtained with the absence of NaCl. Thus, EC-EO is a promising technique to remove CR in an environmentally friendly pathway.
The Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).
Abstract:
Thanks for people's God who brought the great book, prays and peace for
his prophet "Mohammad" the master of missioners to all people.
Allah created human being in it's best way and give him a soul thus ,
he will be a human with faith that has movement and life and the centre of his
soul is the sense which differentiate human from other animals. This
sensation generated from different senses that made the soul.
God had given him a protected heart, talkative tounge and clear seeing
to understand with consideration, so he will prevent himself of falling in wrong
by thinking and situation that he will pass by.
The significance and probability of sensation had talken our attention in
Qur'an . Hence
The US invasion of Iraq in 2003 unleashed the repressed national aspirations of the Kurdish people. After the colonial powers, especially Britain, failed to establish a homeland of scattered Kurds in Iraq, Turkey, Syria and Iran, Iraq's Kurds managed to establish a semi-independent state in the north of the country Which lasted decades against the central authority in Baghdad in protest against what they call the forced integration of Kurds in the Iraqi state, and to obtain more rights and privileges as partners in this country. The federal region in the Kurdistan region of Iraq has become a reality, and it is eager not to strengthen its authority in return for the authority of the central government, but to annex other areas inhabited b
... Show MoreThis paper aims to discuss and analyse the role and importance of implementing industrial Policy to promote industry and enhance economic development in developing countries. The paper discusses the economic justifications for using industrial policy as well as the criticisms leveled against it, for this purpose it analyses the ideas of two different approaches to industrial policy. The first held by the neo-liberals in the USA , who oppose the use of industrial policy and emphasise the role of the market in attaining economic development. The second, represented by many economists who support the use of industrial policy to promote industry and accelerate economic development, they justify their stand by pointing to the negative
... Show MoreThis topic is considered to be of a high degree of importance to every Muslim, and its importance is due to the fact that monotheism is:
Prove that God Almighty is the God who created everything and everything opposite to monotheism is polytheism, and it is taking other than God Almighty as a deity.
Therefore, we have to know the concept of God. If he is known, then he knows the concept of monotheism and the concept of polytheism
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More