The present study intends to prepare nanofibers mat of polyacrylonitrile by electrospinning technique and investigates their adsorption capacity to Congo red dye from the aqueous solution, after characterize it by different techniques such as FTIR, SEM, EDA, XRD and BET. The influence factors on adsorption were studied including adsorbent dosage, initial concentration, contact time, pH and ionic strength. The results confirmed that the increasing in pH decreases the adsorption capacity. So, the optimum adsorbent dosage, initial concentration and contact time were 0.006 g, 25 mg/L and 150 min respectively. The isotherm models of Freundlich and Langmuir were applied on the experimental adsorption data to evaluate the maximum capacity and ener
... Show MoreThis paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
The results revealed that the incidence of Rhizoctonial damping-off of tomato was 65% and 67% in both rotations. Substrates of pine leaf litter and mushcom 2 suppressed infection reaching 59 and 60%. Mushcom1 restricted disease occurrence to 53%. In contrast, formulated Th + B. subtillus revealed a noticeable disease reduction reaching 33.16%, due to nutrients incited from mushroom thallus. The highest occurrence of damping-off (92 and 94 %) was found in control (sandy loam soil) during rotations. However, partial suppressive of Trichoderma spp. against R. solani was detected in different substrates. Mortality was 90% in control (non-amended soil). Finally, a comparable reduction of
... Show MoreSuccessfully, theoretical equations were established to study the effect of solvent polarities on the electron current density, fill factor and efficiencies of Tris (8-hydroxy) quinoline aluminum (Alq3)/ ZnO solar cells. Three different solvents studied in this theoretical works, namely 1-propanol, ethanol and acetonitrile. The quantum model of transition energy in donor–acceptor system was used to derive a current formula. After that, it has been used to calculate the fill factor and the efficiency of the solar cell. The calculations indicated that the efficiency of the solar cell is influenced by the polarity of solvents. The best performance was for the solar cell based on acetonitrile as a solvent with electron current density of (5.0
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More