تم في هذه الدراسة ، تزيين رقائق أكسيد الجرافين (GO) بجسيمات كوبلتيت النيكل النانوية NiCo2O4(NC) عن طريق الترسيب في الموقع ، وتم استخدام المتراكب المحضر (NC: GO) كسطح ماز لإزالة صبغة الميثيل الخضراء ( MG) من المحاليل المائية. تم التحقق من التغطية الناجحة لأوكسيد الجرافين بجزيئات كوبلتيت النيكل النانوية (NC) باستخدام دراسات FT-IR وحيود الأشعة السينية (XRD). كانت أحجام الجسيمات البلورية لل NC و لل GO المزين ب NCهي 10.53 نانوميتر 9.30 نانومتر على التوالي. تم دراسة تأثير العديد من العوامل التجريبية ، بما في ذلك زمن التلامس ، وكمية السطح الماز ، ودرجة الحرارة. كان وقت التلامس الأمثل وكمية السطح 120 دقيقة و 3 مجم / لتر على التوالي. تتلائم بيانات الامتزاز بشكل أفضل مع ايزوثيرم Freundlich. تم استخدام أربعة نماذج حركية لتتبع عملية الامتزاز: معادلة زائفة من الدرجة الأولى ، ومعادلة زائفة من الدرجة الثانية ، ومعادلة الانتشار داخل الجسيمات ، ومعادلة بويد. أظهرت نمذجة البيانات التجريبية أن حركية الامتزاز كانت ممثلة بشكل جيد بنموذج الرتبة الثانية الزائفة (R2 = 0.9945) مع معدل ثابت سرعة يبلغ 3.2 × 10 - 3 (جم / مجم. دقيقة). يتم امتصاص صبغة MG تدريجيًا بواسطة الجسيمات النانوية NC من خلال الانتشار داخل الجسيمات ويتم الاحتفاظ بها بعد ذلك في مسام أصغر. أظهرت قيم التحليل الديناميكي الحراري أن عملية امتزاز صبغة MG كانت ماصة للحرارة بطبيعتها ، و تلقائية وعملية الامتزاز فيزيائية. الكلمات المفتاحية: الانتشار داخل الجسيمات ، المسافات البينية، النموذج الزائف من الدرجة الأولى ، معادلة بويد
Both the double-differenced and zero-differenced GNSS positioning strategies have been widely used by the geodesists for different geodetic applications which are demanded for reliable and precise positions. A closer inspection of the requirements of these two GNSS positioning techniques, the zero-differenced positioning, which is known as Precise Point Positioning (PPP), has gained a special importance due to three main reasons. Firstly, the effective applications of PPP for geodetic purposes and precise applications depend entirely on the availability of the precise satellite products which consist of precise satellite orbital elements, precise satellite clock corrections, and Earth orientation parameters. Secondly, th
... Show MoreThis paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreMy research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad
The interest in art for young ages is seen as an obvious breakthrough and as revealing of psychological and health feelings in addition to emotions, and it is a treatment for those who suffer from behavioral disorders. The problem arose with the following question: What is the role of artistic expression in diagnosing behavioral disorders for primary school pupils? The aim of the research is to detect the behavioral disorders in the artistic expression of the female students' paintings from the teachers' point of view. The descriptive analytical approach was adopted as it is the appropriate method for identifying and estimating the characteristics and features related to people, places and things, and analyzing situations or phenomena as a
... Show MoreThe COVID-19 pandemic has had a huge influence on human lives all around the world. The virus spread quickly and impacted millions of individuals, resulting in a large number of hospitalizations and fatalities. The pandemic has also impacted economics, education, and social connections, among other aspects of life. Coronavirus-generated Computed Tomography (CT) scans have Regions of Interest (ROIs). The use of a modified U-Net model structure to categorize the region of interest at the pixel level is a promising strategy that may increase the accuracy of detecting COVID-19-associated anomalies in CT images. The suggested method seeks to detect and isolate ROIs in CT scans that show the existence of ground-glass opacity, which is fre
... Show MoreIn this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra
... Show MoreAn analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi
... Show MoreSansevieriatrifasciata was studied as a potential biosorbent for chromium, copper and nickel removal in batch process from electroplating and tannery effluents. Different parameters influencing the biosorption process such as pH, contact time, and amount of biosorbent were optimized while using the 80 mm sized particles of the biosorbent. As high as 91.3 % Ni and 92.7 % Cu were removed at pH of 6 and 4.5 respectively, while optimum Cr removal of 91.34 % from electroplating and 94.6 % from tannery effluents was found at pH 6.0 and 4.0 respectively. Pseudo second order model was found to best fit the kinetic data for all the metals as evidenced by their greater R2 values. FTIR characterization of biosorbent revealed the presence of carboxyl a
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More