Aniline and its derivatives are common contaminants in various wastewaters and represent a serious worry for societies health and a challenge to ecologists due to their dangers effects on to the human health.
ZSM-5 zeolite was prepared from locally available materials (kaolin and rice husk) for adsorption of aniline from synthetic wastewater. Characterization of the prepared zsm-5, kinetics and thermodynamic of the adsorption process were investigated.
The characterization results of the prepared zsm-5 zeolite showed that the surface area was 270.1 m2/g and pore volume 0.21828 cm3/g. The silica to alumina ratio (Si/Al) was 166. 47 and the sodium content was 11 wt. %. The atomic force microscope (AFM)
... Show MoreIn this study, mesoporous silica (MPS) is made using the sol-gel method from a cheap source (Na2SiO3) using the surfactant hydroxycetyl hydroxyethyl dimonium chloride as a template. The task is the adsorption-based removal of the medication metoprolol (MP) at concentrations between 10 and 50 ppm. Variables such as: contact time, dose of adsorbent, starting concentration of adsorbate, and adsorption temperature were studied which show the equilibrium time and adsorbent dose are 40 min and 0.05 g respectively. The Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich isotherm models were fitted to the data obtained from the experiments. Comparing the outcomes showed that, of the four investigated isotherm models, the Freundlich equation m
... Show MoreThis paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast gene
... Show MoreFuture generations of wireless communications systems are expected to evolve toward allowing massive ubiquitous connectivity and achieving ultra-reliable and low-latency communications (URLLC) with extremely high data rates. Massive multiple-input multiple-output (m-MIMO) is a crucial transmission technique to fulfill the demands of high data rates in the upcoming wireless systems. However, obtaining a downlink (DL) training sequence (TS) that is feasible for fast channel estimation, i.e., meeting the low-latency communications required by future generations of wireless systems, in m-MIMO with frequency-division-duplex (FDD) when users have different channel correlations is very challenging. Therefore, a low-complexity solution for
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
This paper deals with novels for group of Iraqi Women novelists published in the time period 2003 – 2013, and the functioning of temporal anomalies in the Iraqi Women's narrative.
In general, the novel contains structural elements such as: the characters, events and the places, these elements must be collected by an artist creating a complete work of fiction. However the time dominates the other elements through progression and regaining called Time paradox, it has a modern critical importance because of its impact in highlighting of political, social and cultural events that make up the fictional environment which cast a shadow over other techniques. And that it is clear in the course of the narrative.
The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show More