The 3D electro-Fenton technique is, due to its high efficiency, one of the technologies suggested to eliminate organic pollutants in wastewater. The type of particle electrode used in the 3D electro-Fenton process is one of the most crucial variables because of its effect on the formation of reactive species and the source of iron ions. The electrolytic cell in the current study consisted of graphite as an anode, carbon fiber (CF) modified with graphene as a cathode, and iron foam particles as a third electrode. A response surface methodology (RSM) approach was used to optimize the 3D electro-Fenton process. The RSM results revealed that the quadratic model has a high R2 of 99.05 %. At 4 g L-1 iron foam particles, time of 5 h, and 1 g of graphene, the maximum efficiency of phenol removal of 92.58 % and chemical oxygen demand (COD) of 89.33 % were achieved with 32.976 kWh kg-1 phenol of consumed power. Based on the analysis of variance (ANOVA) results, the time has the highest impact on phenol removal efficiency, followed by iron foam and graphene dosage. In the present study, the 3D electro-Fenton technique with iron foam partials and carbon fiber modified with graphene was detected as a great choice for removing phenol from aqueous solutions due to its high efficiency, formation of highly reactive species, with excellent iron ions source electrode.
Scheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreThe pervaporation using a commercial hydrophilic ceramic membrane supplied from PERVATECH was conducted. The dehydration of ethanol/ water system was used as a model for the pervaporation study. Pervaporation experiments of ethanol/water system were carried out in the temperature range of 303-343K, ethanol concentration in the feed 10-90 vol. % and the feed flow rate in the range of 0.5-10 L/min. In this work, the effect of operation parameters on permeates fluxes as well as permeates separation factors have been studied. The Water flux is strongly dependent on the temperature; it increased with increasing in temperature, which in turn decreased the selectivity of membrane to water molecules.
In addition water flux was decr
... Show MoreThe support vector machine, also known as SVM, is a type of supervised learning model that can be used for classification or regression depending on the datasets. SVM is used to classify data points by determining the best hyperplane between two or more groups. Working with enormous datasets, on the other hand, might result in a variety of issues, including inefficient accuracy and time-consuming. SVM was updated in this research by applying some non-linear kernel transformations, which are: linear, polynomial, radial basis, and multi-layer kernels. The non-linear SVM classification model was illustrated and summarized in an algorithm using kernel tricks. The proposed method was examined using three simulation datasets with different sample
... Show MoreThe inhibition of 3-Benzyl -2-mercaptoquinoizoline -4 (3H)-one (BMQ) on the corrosion of carbon steel in 0.5 M HCl studied by potentionstat polarization methods at 303–333 K. Results obtained show that BMQ act as inhibitor for carbon steel in HCl solution. The inhibition efficiency increase with increase in BMQ concentration. Activation parameters and Gibbs free energy for the adsorption process using Statistical Physics calculated and discussed. Quantum chemical calculations using DFT at the B3LYP/6-31G level of theory were used to calculate some electronic properties of the molecule to verify any correlation between the inhibitive effect and molecular structure of BMQ. The quantum calculations were proceeded to get data around correlati
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreConducting polyaniline / ZnO nano composites are synthesized
using a simplified cheap method with one step in –situ chemical
polymerization, and AC conductivity (σac) of the prepared samples is
studied in the range of frequency from 50 Hz to 15MHz.). The
presence of polarons in the conjugated polymer chain are responsible
for the ac conductivity is reliance on the frequency in these
composites. The effect of increasing the ZnO nano particle
concentration irradiation and gamma radiation on the electric
conductivity was analyzed. The result showed that the
nanocomposite prepared has the highest conductivity, from pure
polyaniline and the exponential factor S was found increasing with
ZnO content it was 0