Biomass is a popular renewable carbon source because it has a lot of potential as a substitute for scarce fossil fuels and has been used to make essential compounds like 5-hydroxymethylfurfural (HMF). One of the main components of biomass, glucose, has been extensively studied as a precursor for the production of HMF. Several efforts have been made to find efficient and repeatable procedures for the synthesis of HMF, a chemical platform used in the manufacturing of fuels and other high-value compounds. Sulfonated graphite (SG) was produced from spent dry batteries and utilized as a catalyst to convert glucose to 5-hydroxymethylfurfural (HMF). Temperature, reaction time, and catalyst loading were the variables studied. When dimethyl sulfoxide was utilized as the solvent at 180°C after 3 hours of reaction time, the greatest HMF yield, glucose conversion, and selectivity were attained, with 56.53 %, 97.5 %, and 57.979 %, respectively. This study demonstrates how to manufacture sulfonated graphite with increased catalytic activity for converting glucose to key biobased platform chemicals in a long-term sustainable manner.
The title compound, [Ru(C12H7Br2N2)2(CO)2], possesses a distorted octahedral environment about the Ru atom, with two cyclometallated 4,4′-dibromoazobenzene ligands and two mutually cis carbonyl ligands. The donor atoms are arranged such that the N atoms are mutually trans and the aryl C atoms are trans to carbonyl ligands.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe current study is descriptive; it focuses on studying the contemporary geopolitical problem, and sectarian differences in Caucasus. Nagorno-Karabakh is considered an important disputed region nowadays. Many parties and states participated in this dispute, especially after the conflict had developed into an open war between Armenia and Azerbaijan. Thus, the study aims to examine the causes of the conflict in this region, analyze the international positions on this conflict, and find if Armenia was able to occupy this region. The methodology adopted by the researchers is the functional approach, and the theory of power analysis that Cohen created for analyzing all strengths that drove each of the parties t
... Show MoreThe objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio
The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio
Objectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form
... Show MoreCoupling reaction of 2-amino benzoic acid with 8-hydroxy quinoline gave bidentate azo ligand. The prepared ligand has been identified by Microelemental Analysis,1HNMR,FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (ZnII,CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes have been characterized by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration ra
... Show MoreKE Sharquie, HR Al-Hamamy, AA Noaimi, AF Tahir, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2