The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb of 4-(4-Nitrobenzeneazo) 3-Aminobenzoic Acid from aqueous solutions has been investigated through columnar method. The azo dye adsorption found to be dependent on adsorbent dosage, initial concentration and contact time. All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.), at room temperature (25±2) °C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monolayer adsorption capacity is 6.4066 mg Azo ligand per 1g calcined Montmorillonite. The experiments showed that highest removal rate 90.5 % for azo dye at pH 5.5.The kinetic data for the adsorption process obeyed pseudo-first -order rate equations.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreKinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics,
... Show MoreThis paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi
Soil is considered one of the main factors of subsidence phenomena which
became continually happen in Baghdad (Ghazalia, Ameria, and Hay al-Amyl)
causing bad effects as shortage of drinking water, traffic jam and formation
swamps.
This thesis depends on soil study to a depth 15 meters, due to its
importance in subsidence. This done through specifying its chemical physical
properties.
Soil within Iraq climate, in case of water stopping for any reason it contract
and shrink away especially when it exposed to high pressure these factors
finally caused subsidence. In case of leakage underground water or that of
damaged water pipes this will contribute to chemical reactions which damage soil
structure and incr
An experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show MoreThe tunnel’s stability during construction is a very important matter. Some methods have been proposed for stability evaluation, but the hazard warning levels (HWLs) are more applicable among these methods. Despite monitoring and applying HWLs, several collapses in Shibli twin tunnels in Iran have cast doubts on the accuracy of this criterion in the presence of water. In this study, the critical strains under different water contents were measured through uniaxial compressive strength tests on 11 different shale and marl samples. A comparison of laboratory tests and numerical results shows that the influence of the moisture content on the critical strain is negligible. In addition, the results show that there is no dir
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show More