Plantation of humic acid nanoparticles on the inert sand through simple impregnation to obtain the permeable reactive barrier (PRB) for treating of groundwater contaminated with copper and cadmium ions. The humic acid was extracted from sewage sludge which is byproduct of the wastewater treatment plant; so, this considers an application of sustainable development. Batch tests signified that the coated sand by humic acid (CSHA) had removal efficiencies exceeded 98 % at contact time, sorbent dosage, and initial pH of 1 h, 0.25 g/50 mL and 7, respectively for 10 mg/L initial concentration and 200 rpm agitation speed. Results proved that physicosorption was the predominant mechanism for metals-CSHA interaction because the sorption data followed pseudo-first-order model. The maximum sorption capacity (qmax) of copper and cadmium reached to 87.5 and 18.9 mg/g, respectively. Characterization tests proved that humic acid nanoparticles were precipitated on the sand surfaces. The computer solution (COMSOL) Multiphysics 3.5a had a high ability in the explanation of experimental migration of adopted metal ions. Measurements and model predictions signified that there was a delay in the propagation of metal front due to decrease of concentration and flow rate at specific bed depth.
A new ligand [N-(4-methoxy benzoyl amino)-thioxo methyl ] leucine (MBL) was prepared from the reaction of (4-methoxy benzoyl isothiocyanate with leucine acid in molar ratio (l:l), it was characterized by elemental analysis (C.H.N.S), FT-IR, UV-Vis, 1H and 13C-NMR. The complexes of the bivalent ions (Mn, Fe, Co, Ni, Cu, Zn, Cd and Hg ) have been prepared and characterized too. The structural was established by elemental analysis (C.H.N.S), FT-IR, UV-Vis spectra, conductivity measurements atomic absorption and magnetic susceptibility and determination of molar ration (M:L). The complexes showed characteristic behavior of tetrahedral geometry around the metal ions except with (Cu) complex showed square planer.
A series of lanthanide metal (???) complexes have been prepared from the new azo ligand, 3-(1-methyl-2-benzimidazolylazo)-Tyrosine (MBT). The structural feature were confirmed on the basis of their elemental analysis, metal content, molar conductance, magnetic measurement, FTIR, 1 HNMR and UV-Vis spectra studies. The isolated complexes were found to have a mole ratio (1:2) (metal:ligand) stoichiometry with the general formula [Ln(MBT)2]Cl (Ln(???) = La, Ce, Pr, Nd, Sm, Eu and Gd). The chelates were found to have octahedral structures. The FTIR spectra shows that the ligand (MBT) is coordinated to lanthanide ions as a N, N, O-tridentate anion via benzimidazole nitrogen, azo nitrogen and oxygen of hydroxyl after deprotonation. Com
... Show Moreحضر الليكاند (L) 1-فنيل-3-بردين-2-يل مثيل-ثايويوريا من تفاعل 2-أمينو مثيل بردين مع فنيل ايزوثايوسيانيت وبنسبة 1: 1 وشخص الليكاند بواسطة التحليل الدقيق للعناصر (C, H, N), الأشعة تحت الحمراء، الأشعة فوق البنفسجية–المرئية وطيف الرنين النووي المغناطيسي كما حضرت وشخصت معقدات أملاح بعض ايونات العناصر الثنائية التكافؤ (Co, Ni, Cu, Cd and Hg). استخدمت تقنية الأشعة تحت الحمراء، الأشعه فوق البنفسجية-المرئية, التوصيلية الكهربائية و الا
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of this paper was to investigate the removal efficiencies of Zn+2 ions from wastewater by adsorption (using tobacco leaves) and forward osmosis (using cellulose triacetate (CTA) membrane). Various experimental parameters were investigated in adsorption experiment such as: effect of pH (3 - 7), contact time (0 - 220) min, solute concentration (10 - 100) mg/l, and adsorbent dose (0.2 - 5)g. Whereas for forward osmosis the operating parameters studied were: draw solution concentration (10 - 150) g/l, pH of feed solution (4 - 7), feed solution concentration (10 - 100) mg/l. The result showed that the removal efficiency by using adsorption was 70% and the removal efficiency by using forward osmosis was 96.2 %.
... Show MoreThe administrative leadership relies on a variety of behavioral paths in the functional areas in which it operates, and thus indicates its ability and thus has the upper hand in the organizational events, and in such a way that it can draw lessons and evaluate the results so as to test the expectations within the framework of the changes.
Does the study sample leadership have the characteristics that enable it to contain both crises and environmental stresses?
The aim of the study was to determine the location of the administrative leaders in the system of the study sample from the issue of crises and environmental pressures. The study concluded with a number of conclusions, the m
... Show More