In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15 concentration, and temperature in the batch system. The batch results showed 98% of 100 mg/L of DB15 was degraded with optimum H2O2 concentration, G-Fe/Cu-NPs dose, pH, and temperature 3.52 mmol/L, 0.7 g/L, 3, and 50℃ respectively. For the continuous mode, the influences of initial DB15 concentration, feed flow rate, G-Fe/Cu-NPs depth were investigated using an optimized experimental Box-Behnken design, while the conditions of pH and H2O2 concentration were based on the best value found in the batch experiments. The model optimization was set the parameters at 2.134 ml/min flow rate, 26.16 mg/L initial dye concentration, and 1.42 cm catalyst depth. All the parameters of the breakthrough curve were also studied in this study including break time, saturation time, length of mass transfer zone, the volume of bed, and volume effluent.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreThe concept of closed quasi principally injective acts over monoids is introduced ,which signifies a generalization for the quasi principally injective as well as for the closed quasi injective acts. Characterization of this concept is intended to show the behavior of a closed quasi principally injective property. At the same time, some properties of closed quasi principally injective acts are examined in terms of their endomorphism monoid. Also, the characterization of a closed self-principally injective monoid is given in terms of its annihilator. The relationship between the following concepts is also studied; closed quasi principally injective acts over monoids, Hopfian, co Hopfian, and directly finite property. Ultimately, based on
... Show MoreThe synthesis and structural characterization of new dithiocarbamate (DTC) ligand and some of its dinuclear transition metal complexes are described. The free dithiocarbamate ligand was prepared through several synthetic routes, including Schiff-base formation. The reaction of 2-aminopropane with terephthaldehyde leads to the formation of Schiff_base which is reduced by methanolic NaBH4 to the corresponding secondary diamine. Diamine( N,N'_ (1,4 phenylenebis (methylene)) bis(propan-2 amine)) reacts with (CS2) in a basic solution of (KOH) to provide the corresponding bis(dithiocarbamate) free_ligand, which undergoes complexation with the appropriate metal (II) chlori
... Show MoreBackground: Tumor-like overgrowth lesions of the oral mucosa are pathological growths that project above the normal contour of the oral surface. A practical classification can be made according to the site of origin, the etiology and the histological appearance. The aim of this article is to evaluate and analyze patients with gingival and alveolar ridge tumor-like overgrowth lesions in terms of surgical treatment, diagnosis and outcome. Materials and Methods: Patients complaining of these lesions were treated by surgical excision under local or general anesthesia; the excised lesions were submitted for histopathological examination, during the follow up period the patients were examined for complications and recurrence. Results: Pyogenic gr
... Show MoreBackground: Tumor-like overgrowth lesions of the oral mucosa are pathological growths that project above the normal contour of the oral surface. A practical classification can be made according to the site of origin, the etiology and the histological appearance. The aim of this article is to evaluate and analyze patients with gingival and alveolar ridge tumor-like overgrowth lesions in terms of surgical treatment, diagnosis and outcome. Materials and Methods: Patients complaining of these lesions were treated by surgical excision under local or general anesthesia; the excised lesions were submitted for histopathological examination, during the follow up period the patients were examined for complications and recurrence. Results: Pyogenic gr
... Show MoreThis paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreMost systems are intelligent and the industrial world is moving now towards
technology. Most industrial systems are now computerized and offer a high speed.
However, Face recognition is a biometric system that can identify people from their
faces. For few number of people to be identified, it can be considered as a fast
system. When the number of people grew to be bigger, the system cannot be adopted
in a real-time application because its speed will degrade along with its accuracy.
However, the accuracy can be enhanced using pre-processing techniques but the
time delay is still a challenge. A series of experiments had been done on AT&TORL
database images using Enhanced Face Recognition System (EFRS) that is