The approach of green synthesis of bio-sorbent has become simple alternatives to chemical synths as they use for example plant extracts, plus green synthesis outperforms chemical methods because it is environmentally friendly besides has wide applications in environmental remediation. This paper investigates the removal of ciprofloxacin (CIP) using green tea nano zero-valent iron (GT-NZVI) in an aqueous solution. The synthesized GT-NZVI was categorized using SEM, AFM, BET, FTIR, and Zeta potentials techniques. The spherical nanoparticles were found to be nano zero-valent, with an average size of 85 nm and a surface area of 2.19m2/g. The results showed that the removal efficiency of ciprofloxacin depends on the initial pH (2.5-10), CIP concentration (2 -15 mg/L), temperature (20 -50°C), time (0-180 min), and GT-NZVI dose (0.1-1 g/L). Batch experiments found that 100% of 0.01 mg/L CIP was removed within 120 min with an initial ratio (w/w) of 1:50 (CIP: GT-NZVI) at optimum pH10. Kinetic models for adsorption and mechanism removal of ciprofloxacin were also examined, and the kinetic analysis showed that adsorption is a physical adsorption mechanism with 0.84606 kJ/mol activation energy. The kinetic removal process is the preferred pseudo-first-order model after a physical diffusion-controlled reaction, due to the low energy of activation of 17.66 kJ/mol. Adsorption isotherms information from Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich models were followed, and the thermodynamic parameter ∆G0 values were -0.3671, -07494, - 2.2490 and-2.3005 kJ/mol at 20, 30, 40, and 50°C, respectively. The value of ΔH0 and ΔS0 were 21.067 kJ/mol and 0.073 kJ/mol.K, which indicated favourable and endothermic sorption. UV-analysis was applied to identify the presence and concentration of CIP in aqueous media.
Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThe effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work, the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat
... Show MoreAs a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given