The combined system of electrocoagulation (EC) and electro-oxidation (EO) is one of the most promising methods in dye removal. In this work, a solution of 200 mg/l of Congo red was used to examine the removal of anionic dye using an EC-EO system with three stainless steel electrodes as the auxiliary electrodes and an aluminum electrode as anode for the EC process, Cu-Mn-Ni Nanocomposite as anode for the EO process. This composite oxide was simultaneously synthesized by anodic and cathodic deposition of Cu (NO3)2, MnCl2, and Ni (NO3)2 salts with 0.075 M as concentrations of each salt with a fixed molar ratio (1:1:1) at a constant current density of 25 mA/cm2. The characteristics structure and surface morphology of the deposited nano oxides onto the graphite substrates were determined by (XRD), (FE-SEM), (AFM), and (EDX). The results shown that nano Cu-Mn-Ni oxides were successfully deposited onto the anode and cathode. The crystal size and root mean square for the cathode were 30.79 nm and 79.36 nm, respectively, while for the anode, they were 24.19 nm and 41.88 nm, respectively. Furthermore, the combined system was examined for C.D, NaCl concentration, and time. In the EC-EO combined system, the cathode and anode were efficient when used as anodes for the EO process, besides aluminum. The cathode was more effective in the removal process than the anode due to its larger crystal size and the rough, granular shape of its surface. When current density (C.D) increased from 3 to 6 mA/cm², the removal efficiency shifted from 95% to 98%. However, excellent removal of 98% and 96.5% was attained with 1.665 and 2.0859 kWh/kg of dye as energy consumption in the presence and absence of NaCl salt, respectively by applying 6 mA/cm2 within 20 min of electrolysis.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThe modern steer-by-wire (SBW) systems represent a revolutionary departure from traditional automotive designs, replacing mechanical linkages with electronic control mechanisms. However, the integration of such cutting-edge technologies is not without its challenges, and one critical aspect that demands thorough consideration is the presence of nonlinear dynamics and communication network time delays. Therefore, to handle the tracking error caused by the challenge of time delays and to overcome the parameter uncertainties and external perturbations, a robust fast finite-time composite controller (FFTCC) is proposed for improving the performance and safety of the SBW systems in the present article. By lumping the uncertainties, parameter var
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThis new azo dye 3-((2-(1H-indol-3-yl) ethyl) diazenyl) quinoline-2-ol was subsequently used to prepare a series of complexes with the metal ions of Cr+3, Cu+2, VO+2, Mn+2and Mo+6. The compounds identified by 1H and 13C-NMR, FT-IR, UV-Vis, mass spectroscopy, as well as TGA, DSC, and C.H.N., conductivity, magnetic susceptibility, metal and chlorine content. The results showed that the ligand behaves in a bidantate, and that the complexes gave octahedral, excepting for VO+2 square pyramid was given, that all complexes are non-electrolytes. The effectiveness of mention the compounds in inhibiting free radicals was evaluated by the ability to act as an antioxidant was measured using DPPH as a free radical and gallic acid as a standard s
... Show MoreNi and Cd complexes of new Schiff base derived from 5-Amino-2-phenyl-2,4-dihydro-pyrazol-3-one with 4-chlorobenzalaldehyde (A) , 2-Hydroxy-benzalaldehyde (B) and 4-Hydroxy-benzaldehyde (C) have been prepared and characterized by elemental analysis , molar conductivity measurements , FTIR , UV- vis , 1HNMR, mass spectrometer and magnetic susceptibility. Analytical data revealed that six complexes were a distorted tetrahedral geometry and exhibited (1:1) metal :ligand ratio. The biological activity for the three ligands and its complexes were studied
ABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreNear surface mounted (NSM) carbon fibers reinforced polymer (CFRP) reinforcement is one of the techniques for reinforcing masonry structures and is considered to provide significant advantages. This paper is composed of two parts. The first part presents the experimental study of brick masonry walls reinforced with NSM CFRP strips under combined shear-compression loads. Masonry walls have been tested under vertical compression, with different bed joint orientations 90° and 45° relative to the loading direction. Different reinforcement orientations were used including vertical, horizontal, and a combination of both sides of the wall. The second part of this paper comprises a numerical analysis of unreinforced brick masonry (URM) wa
... Show More