The cost‐effective dual functions zeolite‐carbon composite (DFZCC) was prepared using an eco‐friendly substrate prepared from bio‐waste and an organic adhesive at intermediate conditions. The green synthesis method used in this study ensures that chemically harmless compounds are used to obtain a homogeneous distribution of zeolite over porous carbon. The greenly prepared dual‐function composite was extensively characterized using Fourier transform infrared, X‐ray diffraction, thermogravimetric analysis, N2 adsorption/desorption isotherms, field emission scanning electron microscope, dispersive analysis by X‐ray, and point of zero charges. DFZCC had a surface area of 248.84 m2/g and a pore volume of 0.141 cm3/g. DFZCC was used in the sorption process of Zn2+ ions from aqueous solutions, and it achieved higher removal (98%) at normal pH of 6.4 and temperature of 40°C. The Langmuir model was the best model for representing equilibrium data with a maximum sorption capacity of 6.711 mg/g. The kinetic studies showed that the pseudo‐second‐order model was the most appropriate model for representing experimental data. The intra‐particle diffusion kinetics demonstrated that the boundary film is the rate‐determining step in the sorption process. The sorption process of Zn2+ ions by DFZCC was spontaneous and endothermic. Moreover, solidification of the spent DFZCC by kaolin successfully reduced the leaching ions to the solution after 12 weeks from exposure to a salty solution.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreThe research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c
... Show MoreEichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show More