Nanoparticles of humic acid and iron oxide were impregnated on the inert sand to produce sorbent for treating groundwater contained of cadmium and copper ions by technology of permeable reactive barrier (PRB). Sewage sludge was the source of the humic acid to prepare the coated sand by humic acid—iron oxide (CSHAIO) sorbent; so, this work is consistent with sustainable development. For 10 mg/L metal concentration, batch tests at speed of 200 rpm signified that the removal efficiencies are greater than 90% at sorbent dosage 0.25 g/ 50 mL, pH 6 and contact time 1 h. The kinetic data was well described by the Pseudo first-order model indicating that physicosorption is the predominant mechanism. The maximum adsorption capacities (qmax) were calculated by Langmuir model and their values of 25.273 and 114.142 mg/g for cadmium and copper ions respectively. Computer solution (COMSOL) Multiphysics program has utilized to simulate the metal ions transport in the column tests. Model predictions as well as experimental measurements signified that increasing bed depth with decreasing of flow rate and inlet concentration leads to delay in the propagation of metal front.
In this work, lanthanium (III) complexes were synthesized using by Schiff base ligand (L) derived from benzaldehyde and o-aminoaniline with five amino acids (AA) from glycine (Gly), L-alanine (Ala), L-valine (Val), L-asparagine (Asp) and DL- phenylalanine (Phe). The Schiff base ligand has been characterized by elemental analysis, (MASS, FTIR, 1HNMR, 13CNMR, UV-VIS) electronic spectra. The structures of the new complexes have been described of analysis of elements, molar conductivity, (UV-Vis electronic, FTIR, mass) spectra also magnetic moment. The molar conductivity values of the complexes indicat this every of complexes are electrolytes and other analytical studies reveal octahedral geometry for La (III) ion. The Schiff base ligand, five
... Show MoreIn this work an experimental simulation is made to predict the performance of steady-state natural heat convection along heated finned vertical base plate to ambient air with different inclination angles and configurations of fin array. Two types of fin arrays namely vertical fins array and V-fins array on heated vertical base plate are used with different heights and spaces. The influence of inclination angle of the plate , configuration of fins array and fin geometrical parameters such as fin height and fin spacing on the temperature distribution, base convection heat transfer coefficient and average Nusselt number have been plotted and discussed. The experimental data are correlated to a formula between average Nusselt number versus R
... Show MoreAspartate aminotransferase was purified from urine and serum of patients with type 2 diabetes in a 2 steps procedure involving dialysis bag and sephadex G-25 gel filtration (column chromatography). The enzyme was purified 346.23 fold with 1467% yield and 3.46 fold with 142.85% yield in urine and serum of patients with type 2 diabetes respectively. The purified enzyme showed single peak. The results of this study revealed that AST activity of type 2 diabetes urine and serum increased significantly (p<0.001) compared with control group.
Background: Differentiation between malignant and benign vertebral compression fracture is often problematic. This is precisely difficult in elderly who are predisposed to benign compression caused by osteoporosis .Establishing correct diagnosis is of great importance in determining the treatment andprognosis.A study was performed to determine which magnetic resonance imaging findings are useful in discrimination between metastatic and acute osteoporotic compression fractures of the spine. Recently MRI is being increasingly used for evaluation of these fractures.Objectives: The aim of this study is to establish the correct diagnosis of malignant and benign compression vertebral fracture by MRI to determine treatment and prognosis.Methods
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More