تم في هذه الدراسة ، تزيين رقائق أكسيد الجرافين (GO) بجسيمات كوبلتيت النيكل النانوية NiCo2O4(NC) عن طريق الترسيب في الموقع ، وتم استخدام المتراكب المحضر (NC: GO) كسطح ماز لإزالة صبغة الميثيل الخضراء ( MG) من المحاليل المائية. تم التحقق من التغطية الناجحة لأوكسيد الجرافين بجزيئات كوبلتيت النيكل النانوية (NC) باستخدام دراسات FT-IR وحيود الأشعة السينية (XRD). كانت أحجام الجسيمات البلورية لل NC و لل GO المزين ب NCهي 10.53 نانوميتر 9.30 نانومتر على التوالي. تم دراسة تأثير العديد من العوامل التجريبية ، بما في ذلك زمن التلامس ، وكمية السطح الماز ، ودرجة الحرارة. كان وقت التلامس الأمثل وكمية السطح 120 دقيقة و 3 مجم / لتر على التوالي. تتلائم بيانات الامتزاز بشكل أفضل مع ايزوثيرم Freundlich. تم استخدام أربعة نماذج حركية لتتبع عملية الامتزاز: معادلة زائفة من الدرجة الأولى ، ومعادلة زائفة من الدرجة الثانية ، ومعادلة الانتشار داخل الجسيمات ، ومعادلة بويد. أظهرت نمذجة البيانات التجريبية أن حركية الامتزاز كانت ممثلة بشكل جيد بنموذج الرتبة الثانية الزائفة (R2 = 0.9945) مع معدل ثابت سرعة يبلغ 3.2 × 10 - 3 (جم / مجم. دقيقة). يتم امتصاص صبغة MG تدريجيًا بواسطة الجسيمات النانوية NC من خلال الانتشار داخل الجسيمات ويتم الاحتفاظ بها بعد ذلك في مسام أصغر. أظهرت قيم التحليل الديناميكي الحراري أن عملية امتزاز صبغة MG كانت ماصة للحرارة بطبيعتها ، و تلقائية وعملية الامتزاز فيزيائية. الكلمات المفتاحية: الانتشار داخل الجسيمات ، المسافات البينية، النموذج الزائف من الدرجة الأولى ، معادلة بويد
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreScheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreSilver nanoparticles synthesized by different species
A new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0
... Show More
The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after
... Show MoreNanoparticles generation by laser ablation of a solid target in a liquid environment is an easy method. Cadmium Telluride (CdTe) colloidal nanoparticles have been synthesized by laser ablation Nd:YAG with wavelengths of 1064nm and double frequency at 532 nm, number of pulses 50 pulses, with pulse energy= 620mJ, 700mJ of a solid target CdTe is immersed in double distilled deionized water (DDIW) and in methanol liquid. Influences of the laser energy and different solutions on the formation and optical characterization of the CdTe nanoparticles have been studied using atomic force microscope (AFM) and the UV-Vis absorption. As a results, it leads to the absorbance in UV-Vis spectra of samples prepared in water at laser wavelength of 532nm i
... Show More