This study examines the removal of ciprofloxacin in an aqueous solution using green tea silver nanoparticles (Ag-NPs). The synthesized Ag-NPs have been classified by the different techniques of SEM, AFM, BET, FTIR, and Zeta potential. Spherical nanoparticles with average sizes of 32 nm and a surface area of 1.2387m2/g are found to be silver nanoparticles. The results showed that the ciprofloxacin removal efficiency depends on the initial pH (2.5-10), CIP (2-15 mg/L), temperature (20-50°C), time (0-180 min), and Ag-NPs dosage (0.1-1g/L). Batch experiments revealed that the removal rate with ratio (1:1) (w/w) were 52%, and 79.8% of the 10 mg/L of CIP at 60, and 180 minutes, respectively with optimal pH=4. Kinetic models for adsorption and ciprofloxacin mechanism removal were also investigated, and kinetic analyzes showed adsorption to be a 3.8727kJ.mol-1 activation energy physical adsorption mechanism. The kinetic removal process, due to the low activation energy of 14.0606kJ.mol-1, is preferred the model of first-order after a physical diffusion-controlled reaction. Adsorption information from Langmuir, Freundlich, Temkin, and Dubinin models was followed, and the Dubinin isotherm model was the best-fitted model. the thermodynamic parameter ?G0 values at 20, 30, 40 and 50°C were (0.5163, -0.0691, -0.9589, -0.5927kJ/mol). The value of ?H0 and ?S0 were (12.713kJ/mol and 0.0422073kJ/mol.k) which indicated favorable and endothermic sorption. The presence and concentration of CIP in aqueous media were identified through UV analysis.
This research paper aimed to quantitively characterize the pore structure of shale reservoirs. Six samples of Silurian shale from the Ahnet basin were selected for nitrogen adsorption-desorption analysis. Experimental findings showed that all the samples are mainly composed of mesopores with slit-like shaped pores, as well as the Barrett-Joyner-Halenda pore volume ranging from 0.014 to 0.046 cm3/ 100 g, where the lowest value has recorded in the AHTT-1 sample, whereas the highest one in AHTT-6, while the rest samples (AHTT-2, AHTT-3, AHTT-4, AHTT-5) have a similar average value of 0.03 cm3/ 100 g. Meanwhile, the surface area and pore size distribution were in the range of 3.8 to 11.1 m2 / g and 1.7 to 40 nm, respectively.
... Show MoreCurrently, one of the topical areas of application of machine learning methods is the prediction of material characteristics. The aim of this work is to develop machine learning models for determining the rheological properties of polymers from experimental stress relaxation curves. The paper presents an overview of the main directions of metaheuristic approaches (local search, evolutionary algorithms) to solving combinatorial optimization problems. Metaheuristic algorithms for solving some important combinatorial optimization problems are described, with special emphasis on the construction of decision trees. A comparative analysis of algorithms for solving the regression problem in CatBoost Regressor has been carried out. The object of
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators