In the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative characterization of surface structure and morphology of the accumulated oxides. The energy dispersive X-ray (EDX) provided a semi-quantitative analysis of deposit composition. The atomic force microscopy (AFM) apparatus quantified the roughness. We examined the efficiency of composite electrodes in coinciding with the removal of Chemical Oxygen Demand (COD) under current densities of 40, 60, and 80 mA/cm2, pH values of 3, 4, and 5, and NaCl concentrations of 1, 1.5, 2 g/l. RSM covered the optimization of process parameters in conjunction with Central Composite Design (CCD). The COD represented the response function in the optimization procedure. The optimal current density, NaCl concentration, and pH magnitude were 80 mA/cm2, 1.717 g/l, and 3, respectively. The efficiency of COD elimination of 99.925% attained after 1 hour of indirect electrochemical oxidation with an energy consumption of 152.380 kWh per kilogram of COD. The COD elimination model is significant based on the correlation coefficient (R2) and F-values, and the experimental data fitted well to a second-order polynomial model with R2 of 98.93%.
Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreBaylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MorePurpose: To compare the central corneal thickness (CCT),minimum corneal thickness (MCT) and corneal power measured using theScheimpflug-Placido device and optical coherence tomography (OCT) in healthy eyes. Study Design: Descriptive observational. Place and Duration of Study: Al-Kindy college of medicine/university of Baghdad, from June 2021 to April 2022. Methods: A total of 200 eyes of 200 individuals were enrolled in this study. CCT and MCT measurements were carried out using spectral-domain optical coherence tomography (Optovue) and a Scheimpflug-Placido topographer (Sirius).The agreement between the two approaches was assessed using Bland-Altman analysis in this study. Results: Mean age was 28.54 ± 6.6 years, me
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe process involved isolating E. faecium from the gut of honeybees, screening the bacterium for bacteriocin-like inhibitory substance (BLIS), evaluating its impact on the expression of the mexA gene in multidrug-resistant (MDR) P. aeruginosa, and determining the role of bacteriocin in treating infected wounds in mice through histopathological examination. After evaluating the best circumstances for producing BLIS, it was discovered that glucose was a superior carbon source and yeast extract was the best source of nitrogen. The pH was found to be 5, the ideal incubation time was 72 hours, and ammonium sulfate salt was used for partial purification at 80% saturation. The identification of MDR P. aeruginosa isolates from pus infection
... Show MoreEnterobius vermicularis infection is considered as one of the important causes of anaemia and malnutrition among children. This topic has recently received an increased amount of attention. The objective of this study is to evaluate the demographical, anthropometrical, nutritional, and haematological status of E. vermicularis infection among children. This study was conducted in Al Diwaniyah province, south of Iraq, for the period of October 2020 to the end of January 2021. The study included 122 children from both genders (males, n= 61, and females, n=61) and their ages ranged between 1 and 14 years. Nutritional status, body mass index (BMI), BMI percentile, and weight- for- age Z score were evaluated for some particip
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More