This study depicts the removal of Manganese ions (Mn2+) from simulated wastewater by combined electrocoagulation/ electroflotation technologies. The effects of initial Mn concentration, current density (C.D.), electrolysis time, and different mesh numbers of stainless steel screen electrodes were investigated in a batch cell by adopting Taguchi experimental design to explore the optimum conditions for maximum removal efficiency of Mn. The results of multiple regression and signal to noise ratio (S/N) showed that the optimum conditions were Mn initial concentration of 100 ppm, C.D. of 4 mA/cm2, time of 120 min, and mesh no. of 30 (wire/inch). Also, the relative significance of each factor was attained by the analysis of variance (ANOVA) which indicates that the percentage of contribution followed the order: time (47.42%), C.D. (37.13%), Mesh number (5.73%), and Mn initial Conc. (0.05%). The electrolysis time and C.D. were the most effective operating parameters and mesh no. had a fair influence on Mn removal efficiency, while the initial conc. of Mn. had no significant effect in the studied ranges of control factors. Regression analysis (R2= 90.16%) showed an acceptable agreement between the experimental and the predicted values, and confirmation test results revealed that the removal efficiency of Mn at optimum conditions was higher than 99%.
The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr
... Show MoreIn this study, hexadecyltrimethylammonium bromide (HDMAB) - bentonite was synthesized by placing alkylammonium cation onto bentonite. Adsorption of textile dye such as direct Yellow 50 on natural bentonite and HDMAB -bentonite was investigated. The effects of pH, contact time,dosage clay and temperature were investigated experimentally .The Langmuir and Freundlish isotherms equations were applied to the data and values of parameters of these isotherm equations were evaluated. The study indicated that using 0.2 g of HDMAB (hexadecyltrimethylammonium bromide) lead to increase the percentage removal(R%) from 78% for pure bentonite to 99 %. The optimum pH value for the adsorption experiments was found to be pH=3 and therefore all the experim
... Show MoreThe main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equ
... Show More4-[(2-hydroxy-4,6-dimethylphenyl)diazenyl]-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one has been readied by combination the diazonium salt of 4-aminoantipyrine with 3,5-dimethylphenol. Spectral studies ( FTIR, UV-Vis, 1H and 13CNMR) and microelemental analysis (C.H.N) are use to identified of the ligand. Complexes of some transition metals were performed as well depicted. The formation of complexes were characterized by using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4 - 3×10-4 M/L). height m
... Show More(E)-2-(benzo[d]thiazol-2-yliazenyl)-4-methoxyaniline was synthesized by reaction the diazonium salt of 2-aminobenzothiazole with 4-methoxyaniline. Identified of the ligand by spectral techniques (UV-Vis, FTIR,1HNMR and LC-Mass) and microelemental analysis (C.H.N.S.O) are used to produce of the azo ligand. Complexes of (Co2+, Ni2+, Cu2+ and Zn2+) were synthesized and identified using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4-3×10-4 mole/L). height molar absorptivity of compound solutions h
... Show MoreComplexes of Co(II),Ni(II),Cu(II) and Zn(II) with mixed ligands of phenylalanine (L) and tributylphosphine (TBPh) were prepared in aqueous ethanol with (2:1:1) (M:L:TBPh). The prepared complexes were characterized using flame atomic absorption,(C.H.N)Analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. In addition biological activity of the phenylalanine and complexes against two selected type of bacteria were also examined. Some of the complexes exhibit good bacterial activities. From the obtained data the octahedral structure was suggested for all prepared complexes.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images.
So, this study aimed at testing the system performance at poor s
... Show More