The best optimum temperature for the isolate was 30○C while the pH for the maximum mineral removal was 6. The best primary mineral removal was 100mg/L, while the maximum removal for all minerals was obtained after 8 hrs, and the maximum removal efficiency was obtained after 24 hrs. The results have proved that the best aeration for maximum removal was obtained at rotation speed of 150 rpm/ minute. Inoculums of 5ml/ 100ml which contained 106 cell/ ml showed maximum removal for the isolate.
Abstract
The aim of the current research is to identify the level of availability of written expression skills included in the Arabic language curriculum document among middle school students from the teachers' point of view. The researcher used the descriptive approach. To analyze the data and access the research results, he used the (SPSS) program. The research was conducted during the first semester of the academic year 1442/1443 AH on a random sample of Arabic language teachers in the Bisha Education Department. They reached about (213) male and female teachers. The results revealed a number of indicators: the level of availability of written expression skills among middle school students in Bisha governorate
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThe goal of health awareness is to familiarize people with health information and facts, and make them realize their sense of responsibility towards their health and the health of others. And translate that goal in practice through applying healthy and sound behaviors spontaneously. This, the goal, is pursued by health awareness announcements through employing announcement persuasion of health as one of the methods of influencing the masses to adopt ideas, behaviors, and adherence to health advice and guidelines; The study aims to analyze the content of the Ministry of Health and Environment announcements regarding health awareness and to reveal the most employable persuasions in health awareness announcements
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More