An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlated in term of Sherwood and Reynolds numbers based on the wire diameter of woven screen for characteristic length .Empirical correlation characterized the mass transport properties of the reactor is: Sh = 8.077 Re0.363.
In this work, composite materials were prepared by mixing different concentrations of ferrites with polyacrylonitrile (PAN) polymer. Using the electrospinning technique, these composites were deposited on a p-type silicon wafer. The prepared samples demonstrated nanofibers in both pure PAN polymers and their composites with ferrite. Prior to examining the humidity sensing effectiveness with a percentage of relative humidity at a frequency of 10 kHz, based on ambient temperature and a relative humidity range of 50–100%, the composite nanofibers demonstrated stronger humidity sensing compared to the pure PAN nanofibers, which demonstrated a powerful resistance response. More precisely, the PAN@ferrite nanocomposite showed a broad adsorption
... Show MoreTwo Schiff base ligands L1 and L2 have been obtained by condensation of salicylaldehyde respectively with leucylalanine and glycylglycine then their complexes with Zn(II)were prepared and characterized by elemental analyses , conductivity measurement , IR and UV-Vis .The molar conductance measurement indicated that the Zn(II) complexes are 1:1 non-electrolytes. The IR data demonstrated that the tetradentate binding of the ligands L1 and L2 . The in vitro biological screening effect of the investigated compounds have been tested against the bacterial species Staphlococcus aureus, Escherichia coil , Klebsiella pneumaniae, Proteus vulgaris and Pseudomonas aeruginosa by the disc diffusion method . A comparative study of inhibition values of
... Show MoreCopper and Zinc powders with different particle sizes were subjected to sieving of range (20-100?m) and He-Ne laser system to determine the particle size . 1wt% from each powders was blended carefully with 99wt% from Iraqi oil . Microscopic examination were carried for all samples to reveal the particle size distribution . XRF intensity measurements were conducted for all suspended samples , and the relation between XRF intensity and the particle size was found .
Background: One of the most important complications of fixed orthodontic treatment is formation of white spots, which are initial carious lesions. Addition of antimicrobial agents into orthodontic adhesive material might be wise solution for prevention of white spots formation. The aim of this study was to evaluate the antibacterial properties of orthodontic adhesive primer against S. Mutans after adding the three different types of nanoparticles (Ag, ZnO, or TiO2). Materials and methods: Discs were prepared using empty insulin syringe approximately 2 mm×2 mm rounded in shape specimens (40 discs) were divided into four groups (ten discs for each group): The first group was the control (made from primer only), the second group (10 dis
... Show MoreThe cost‐effective dual functions zeolite‐carbon composite (DFZCC) was prepared using an eco‐friendly substrate prepared from bio‐waste and an organic adhesive at intermediate conditions. The green synthesis method used in this study ensures that chemically harmless compounds are used to obtain a homogeneous distribution of zeolite over porous carbon. The greenly prepared dual‐function composite was extensively characterized using Fourier transform infrared, X‐ray diffraction, thermogravimetric analysis, N2 adsorption/desorption isotherms, field emission scanning electron microscope, dispersive analysis by X‐ray, and point of zero charges. DFZCC had a surface area o
Almost all thermal systems utilize some type of heat exchanger. In a lot of cases, evaporators are important for systems like organic Rankine cycle systems. Evaporators give a share in a large portion of the capital cost, and their cost is significantly attached to their size or transfer area. Open-cell metal foams with high porosity are taken into consideration to enhance thermal performance without increase the size of heat exchangers. Numerous researchers have tried to find a representation of the temperature distribution closer to reality due to the different properties between the liquid and solid phases. Evaporation heat transfer in an annular pipe of double pipe heat exchanger (DPHEX) filled with cooper foam is investigated numerical
... Show More
Reconstruction of female identity is one of the important issues in modern times. The majority of the females who descent from the countries of the third world confront lots of problems because of their race and gender. Black females or colored skin females because of the oppression of the white society upon them, try hard to cope with society in order to get some relief and feel that they are part of this cruel white society. One of the solutions for these black females is to reconstruct their identity by mimicry to the English beauty standards. Zadie Smith is a postcolonial author. She deals with third- world women and how they are treated in a minority and in a racist way. She strives to empower the subaltern black females who ha
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show More