The Wheat husk is one of the common wastes abundantly available in the Middle East countries especially in Iraq. The present study aimed to evaluate the Wheat husk as low cost material, eco-friendly adsorbents for the removal of the carcinogenic dye (Congo red dye) from wastewater by investigate the effect of, at different conditions such as, pH(3-10), amount of adsorbents (1-2.3gm/L),and particle size (125-1000) μm, initial Congo red dye concentration(10, 25 , 50 and 75mg/l) by batch experiments. The results showed that the removal percentage of dye increased with increasing adsorbent dosage, and decreasing particle size. The maximum removal and uptake reached (91%) , 21.5mg/g, respectively for 25 initial concentration, pH 6.7 and 1.5 g/l Wheat husk dosage. The experimental data fitted well to Langmuir isotherm mode. The kinetic data support the assumptions of chemisorption were indicates a good fitting to the pseudo-second-order model.
Abstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreThe usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu
... Show MoreAnastrozole (ANZ) is considered constitute of the fourth –generation of Non–steroidal aromatase blockage, ANZ has use for hormone receptor positive breast cancer in postmenopausal women. The serious side effects of ANZ including, vaginal dryness, hot flashes, irritability, breast tenderness and un–stability in circulation.
Nanostructured lipid carriers (NLCs) have recently emerged as a multifunctional platform for drug delivery in cancer therapy.
Five formula were composed of (200 mg of glyceryl monostearate, 40 mg of oleic acid , 1% (w/w) Tween 80, 1% (w/w) Poloxamer 407, 1% (w/w) soy lecithin and Vitamin E Polyethylene Glycol Succinate.
The mean particle size, polydispersity index, zeta potential, entrapme
... Show MoreRefuse derived fuel (RDF) is considered one of the most important types of low cost thermal energy which can be tapped in the industry, especially the cement industry in particular being the need of high thermal energy during the production processes, and in this paper we have implemented the use of a derivative of the fuel RDF as a substitute for gasoline , to reduce production costs and thereby achieve production efficiency, and the methodology used in this research statistical analysis as well as the use of the cost of kaizen target for the purpose of reducing costs and achieve production efficiency, and this has reduced the cost total cement production by which led to reduce total costs of cement production by 8.4% and an incre
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near topological spaces over B. Also, we introduce the concepts of fibrewise near closed and near open topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Due to the impact of industrial companies on the ransformations and developments witnessed by the world in general nd Iraq in particular, especially in the industrial and economic Jonrnal spects, the liberalization of internal and external trade, and the idoption of the open market policy in Iraq, which led to the intensification of competition between industrial companies and heir products and services, and the increase and diversity of the Onumber of alternatives Available to the public on the one hand, and he diversity and change of their desires and needs on the other hand, which was reflected in the reality of those companies and heir products or services, especially in light of the great challenges facing companies and the deteriorat
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More