Nanoparticles of humic acid and iron oxide were impregnated on the inert sand to produce sorbent for treating groundwater contained of cadmium and copper ions by technology of permeable reactive barrier (PRB). Sewage sludge was the source of the humic acid to prepare the coated sand by humic acid—iron oxide (CSHAIO) sorbent; so, this work is consistent with sustainable development. For 10 mg/L metal concentration, batch tests at speed of 200 rpm signified that the removal efficiencies are greater than 90% at sorbent dosage 0.25 g/ 50 mL, pH 6 and contact time 1 h. The kinetic data was well described by the Pseudo first-order model indicating that physicosorption is the predominant mechanism. The maximum adsorption capacities (qmax) were c
... Show MoreThe yellow scale insect
In vivo study was made for the coumpounds 3-(ocetyl Salicyloyl)-5,6-O-isoprpy lideneL-ascorbicocid,2,3-(acetyl Salicyloyl )-5,6-o- isopropylidene-L-ascorbic acid and 2,3,5,6(acetyl Salicyloyl )-L- ascorbic acid .And a measurement was mod for the concentration of the liberated aspirin in blood samples a fter (2,3,4,6,8,10) hours of the initial dose for the animal .The results showed that the highest concentration of aspirin was after four hours of giving the dose to the animal which is in accordance with pharmacokinetics studies
An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreIn this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.
In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More