The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
This article presents the simultaneous adsorption of bimetal Cu2+ and Zn2+ from an aqueous solution using activated carbon synthesized from a plum seed precursor by sulfuric acid and microwave activation: plum seeds chemically activated by 45% (w/w) sulfuric acid with 2:1 ratio for 4 h, then carbonized for 2 h at 700 °C and the product obtained activated in a microwave oven for 20 min at 700 W for final of activation. Plum seeds and activated carbon produced were characterized in terms of their physical and chemical composition using Brunauer–Emmett–Teller measurements, field emission scanning electr
Removal of Congo red, Rhodamine B, and Dispers Blue dyes from water solution have been achieved using Flint Clay as an adsorbent. The adsorption was studied as a function of contact time, adsorbent dose, pH, and temperature under batch adsorption technique. The equilibrium data fit with Langmuir, Freundlich and Toth models of adsorption and the linear regression coefficient R2 was used to elucidate the best fitting isotherm model. Different thermodynamic parameters, namely Gibb’s free energy, enthalpy and entropy of the on-going adsorption process have also been evaluated. Batch technique has been employed for the kinetic measurements and the adsorption of the three dyes follows a second order rate kinetics. The kinetic investigations al
... Show MoreThe remove of direct blue (DB71) anionic dye on flint clay in aqueous solution was investigated by using a batch system for various dye concentrations. The contact time, pH, adsorbent dose, and temperature was studied under batch adsorption technique. The data of adsorption equilibrium fit with isotherm Langmuar and Freiundlich ,when the correlation coefficient used to elucidate the best fitting isotherm model. The thermodynamic parameters such as, ?Hº ,?Sº and ?Gº. Thermodynamic analysis indicated that the sorption of the dyes onto Flint clay was endothermic and spontaneous.
Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series o
... Show MoreThis work was conducted to study the treatment of industrial waste water, and more particularly those in the General Company of Electrical Industries.This waste water, has zinc ion with maximum concentration in solution of 90 ppm.
The reuse of such effluent can be made possible via appropriate treatments, such as chemical coagulation, Na2S is used as coagulant.
The parameters that influenced the waste water treatment are: temperature, pH, dose of coagulant and settling time.
It was found that the best condition for zinc removal, within the range of operation used ,were a temperature of 20C a pH value of 13 , a coagulant dose of 15 g Na2S /400ml solution and a settling time of 7 days. Under these conditions the zinc concentrat
Background. Dental implantation has become a standard procedure with high success rates, relying on achieving osseointegration between the implant surface and surrounding bone tissue. Polyether ether ketone (PEEK) is a promising alternative to traditional dental implant materials like titanium, but its osseointegration capabilities are limited due to its hydrophobic nature and reduced surface roughness. Objective. The aim of the study is to increase the surface roughness and hydrophilicity of PEEK by treating the surface with piranha solution and then coating the surface with epigallocatechin-3-gallate (EGCG) by electrospraying technique. Materials and Methods. The study includes four groups intended to investigate the effect of pir
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More