An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlated in term of Sherwood and Reynolds numbers based on the wire diameter of woven screen for characteristic length .Empirical correlation characterized the mass transport properties of the reactor is: Sh = 8.077 Re0.363.
Abstract :
The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud
... Show MoreThis study is an approach to assign the land area of Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of Baghdad and 83 kilometers south of Erbil [ Climatic atlas of Iraq, 1941-1970 ] into different multi zones by using Satellite image and Arc Map10.3, zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show MoreKE Sharquie, SA Al-Mashhadani, A A Noaimi, RK Al-Hayani, SA Shubber, Iraqi Journal of Community Medicine, 2017 - Cited by 1
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More