Investigation of the adsorption of acid fuchsin dye (AFD) on Zeolite 5A is carried out using batch scale experiments according to statistical design. Adsorption isotherms, kinetics and thermodynamics were demonstrated. Results showed that the maximum removal efficiency was using zeolite at a temperature of 93.68751 mg/g. Experimental data was found to fit the Langmuir isotherm and pseudo second order kinetics with maximum removal of about 95%. Thermodynamic analysis showed an endothermic adsorption. Optimization was made for the most affecting operating variables and a model equation for the predicted efficiency was suggested.
The coefficient of charge transfer at heterogeneous devices of Au metal with a well-known dyeis investigations using quantum model.Four different solvent are used to estimation the effective transition energy. The potential barrier at interface of Au and dye has been determined using effective transition energy and difference between the Fermi energy of Au metal and ionization energy of dye. A possible transfer mechanism cross the potential barrier dyeand coupling strength interaction between the electronic levels in systems of Au and is discussed.Differentdata of effective transition energy and potential barrier calculations suggest that solvent is more suitable to binds Au with dye.
The present study aims to evaluate the biosorption of reactive orange dye by using garden grass. Experiments were carried out in a batch reactor to obtain equilibrium and thermodynamic data. Experimental parameters affecting the biosorption process such as pH, shaking time, initial dye concentrations, and temperature were thoroughly examined. The optimum pH for removal was found to be 4. Fourier transform infrared spectroscopy analysis indicated that the electronegative groups on the surface of garden grass were the major groups responsible for the biosorption process. Four sorption isotherm models were employed to analyze the experimental data of which Temkin and Pyzhey model was found to be most suitable one. The maxim
... Show MoreThe fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase more
... Show MoreThe fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More