The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of copper mass transfer across the membrane. As the applied voltage increased, the rate constant also increased. Additionally, increasing the pH of the solution led to an initial elevate in the rate constant, reaching a maximum value at pH 5, after which it started to decline. Moreover, higher initial copper concentrations had an adverse effect on the rate constant. Notably, the concentration decay profiles observed under different operating conditions followed first-order kinetics, with correlation coefficients exceeding 0.99. The elucidation of this discovery emanated from a remarkable and striking congruence between the experimental data and the mathematical underpinnings of the first-order kinetics model. This serendipitous alignment profoundly reinforced the robustness, veracity, and unwavering reliability of meticulously obtained results, amplifying the credibility and trustworthiness of the present comprehensive study.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show MoreThe efficiency of egg yolk emulsion in coating DNA and its delivery across cellular membranes was evaluated in comparison with liposomes DOPE . The murine leukemia viral oncogene v-abl , cloned on pBR322 was used as a DNA substrate for direct injection into mice tissue . the DNA complexes were prepared by mixing the DNA with egg yolk emulsion and liposome . Each was directly injected into mice peritoneal cavity with proper control. The gene delivery was examined phenotypically by blood analysis and cytogenetic analysis . Chromosomal changes were detected in the bone marrow as from the fourth day post inoculation through the eleventh day when chromosomal ring s could be seen . this was accompanied by decrease in the WBC count ,
... Show More