The adsorption process of reactive blue 49 (RB49) dye and reactive red 195 (RR195) dye from an aqueous solutions was explored using a novel adsorbent produced from the sunflower husks encapsulated with copper oxide nanoparticle (CSFH). Primarily, the features of a CSFH, such as surface morphology, functional groups, and structure, were characterized. It was determined that coating the sunflower husks with copper oxide nanoparticles greatly improved the surface and structural properties related to the adsorption capacity. The adsorption process was successful, with a removal efficiency of 97% for RB49 and 98% for RR195 under optimal operating conditions, contact time of 180 min, pH of 7, agitation speed of 150 rpm, initial dye concentration of 10 mg/L, CSFH mass of 0.2 g/100 mL dye solution, and temperature of 25 °C. According to findings of thermodynamic, adsorption process was a spontaneous, chemical, and endothermic with increased variability at the solid-solution interface during the stabilization of the reactive dyes onto the adsorption active sites. The second-order kinetic model fits the experimental results better, indicating that the chemisorption mechanism controls the adsorption of RB49 and RR195. Meanwhile, the Sips isotherm best fitted to RB49 and RR19, indicating that both heterogeneous and homogenous adsorptions occurred. The findings suggest that CSFH has potential use as an efficient and profitable adsorbent for removing reactive dyes from aqueous solutions.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show MorePhotovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MoreThe study was conducted at the fields of the Department of Horticulture and Landscape Gardening,College of Agriculture, University of Baghdad during the growing seasons of 2013- 2014 .forPerformance of Evaluation Vegetative growth and yield traits and estimate some important geneticparameter on seven selected breed of tomato which (S1-S7 ) Pure line. the results found significantdifferences between breeds in all study trails except clusters flowering number .S1 significantly plantlength which reached 227.3 .Also S1,S2 and S4 were significantly increased the number fruit for plant,Fruit weight Increased in S3 ,S6 and plant yield. Increased in S1, S4 ,S5. Genetic variation valueswere low in Floral clusters , TSS and fruit firmest and medium i
... Show MoreA series of overbased magnesium fatty acids such as caprylate, caprate, laurate, myristate, palmitate, stearate and oleate) were synthesized by the reaction of the fatty acids with active – 60 magnesium oxide and carbon dioxide (CO2) gas at 60 oC in the presence of ammonia solution as catalyst, toluene / ethanol solvent mixture (9:1vol/vol) was added.
The prepared detergent additives were characterized by FTIR, 1HNMR and evaluated by blending each additive in various concentrations with medium lubricant oil fraction (60 stock) supplied by Iraqi Midland Refineries Company. The total base number (TBN, mg of KOH/g) was determined, and the results of TBN were treated by using two-way analysis of variance (ANOVA) test. It was found that
The Ground Penetrating Radar (GPR) is frequently used in pavement engineering
for road pavement inspection. The main objective of this work is to validate
nondestructive, quick and powerful measurements using GPR for assessment of subgrade
and asphalt /concrete conditions. In the present study, two different antennas
(250, 500 MHz) were used. The case studies are presented was carried in University
of Baghdad over about 100m of paved road. After data acquisition and radar grams
collection, they have been processed using RadExplorer V1.4 software
implementing different filters with the most effective ones (time zero adjustment and
DC removal) in addition to other interpretation tool parameters.
The interpretatio
In all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreAfter looking at the books of the first two grammarians, may God have mercy on them and reward them for what they have provided us with the rules of service to the Book of God and service to Arabic, we must highlight some of the things that the grammarians wanted to clarify, which did not come out of what they proved, but we are working on the statement of the issuance of the passport Provisions from the syntactic industry, and whether it is intended to prove a rule is not very added to the statement of speech, and we know that language, any language was the function of understanding; therefore they said: (speech is a useful word that indicates the benefit improves silence on them), and this concept between Grammatical controls and conte
... Show More