This study depicts the removal of Manganese ions (Mn2+) from simulated wastewater by combined electrocoagulation/ electroflotation technologies. The effects of initial Mn concentration, current density (C.D.), electrolysis time, and different mesh numbers of stainless steel screen electrodes were investigated in a batch cell by adopting Taguchi experimental design to explore the optimum conditions for maximum removal efficiency of Mn. The results of multiple regression and signal to noise ratio (S/N) showed that the optimum conditions were Mn initial concentration of 100 ppm, C.D. of 4 mA/cm2, time of 120 min, and mesh no. of 30 (wire/inch). Also, the relative significance of each factor was attained by the analysis of variance (ANOVA) which indicates that the percentage of contribution followed the order: time (47.42%), C.D. (37.13%), Mesh number (5.73%), and Mn initial Conc. (0.05%). The electrolysis time and C.D. were the most effective operating parameters and mesh no. had a fair influence on Mn removal efficiency, while the initial conc. of Mn. had no significant effect in the studied ranges of control factors. Regression analysis (R2= 90.16%) showed an acceptable agreement between the experimental and the predicted values, and confirmation test results revealed that the removal efficiency of Mn at optimum conditions was higher than 99%.
ne,؛Stability constants were determined for complexes of amino acids : L-leuc tryptophane and Aspartic acid with thorium (IV ) and uranyle ( U02++) ions at ؛ serine
Four mixed ligand complexes were prepared from 1,10-phenanthroline (Phen), 5-chlorosalicylic acid (CSA), and anthranilic acid (Anthra) dissolved in aqueous ethanol at a ratio of (1:1:1:1) M: Phen:CSA: Anthra, M(II)= Cu, Zn, Cd, and Hg. The prepared compounds were analyzed by flame atomic absorption, FT-IR, UV-Vis, and spectroscopic methods, as well as conductivity measurements and magnetic properties. After analyzing the prepared compounds using the acquired data, the complexes formed by mixing ligands were concluded to adopt an octahedral geometry. That study has been conducted to test the inhibitory effectiveness of the complexes (1,10-Phenanthroline (Phen), 5-Chlorosalicylic acid (CSA), Na[Cu(Phen)(CSA)(Anthra), Na[Zn(Phen)(CSA
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreRecent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreFurfural is one of the one of pollutants in refinery industrial wastewaters. In this study advanced oxidation process using UV/H2O2 was investigated for furfural degradation in synthetic wastewater. The results from the experimental work showed that the degradation of furfural decreases as its concentration increases, reaching 100% at 50mg/l furfural concentration and increasing the concentration of H2O2 from 250 to 500 mg/l increased furfural removal from 40 to 60%.The degradation of furfural reached 100% after 90 min exposure time using two UV lamps, where it reached 60% using one lamp after 240 min exposure time. The rate of furfural degradation k increased at the pH and initial concentratio
... Show More