This paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation of B.G dye. All the conditions above have been studied to reach the optimum operation condition for the two processes Fenton and photo- Fenton. The B.G degradation process follows first- order reaction rules. Photo- Fenton process causes a more efficient oxidation rate than the Fenton process. So, the photo- Fenton degradation is an effective and economic process by producing higher percentage of degradation and mineralization in short radiation time.
In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between
... Show MoreDenture cleansing is an essential step that can stop cross‑contamination and adds to the health of the patient, denture durability, and the general quality of life. A disinfection technique must be practical and devoid of damaging effects on the material's properties used to construct the denture base. The main aim of this study is to evaluate the effect of three concentrations of electrolyzed water denture cleanser on heat cure acrylic and polyamide after immersion in electrolyzed water. The evaluation is based on their efficacy on surface hardness, wettability, and color stability compared with one submerged in distilled water as a control group. The method consists of eighty samples of heat-cured acrylic and polyamide material.
... Show MoreThe language that consists of only twenty-eight letters, but it is so broad that we are unable to understand it from all sides and this expansion is mainly caused by imagination, so Arab imagination, whose language goes in all directions And as it always responds to our ears, ancient critics divide imagination into holistic and partial But the language is not limited to these parts only. Do we wonder, where is the structural method of wishing, hope, questions and other methods of all this? In this paper, we try to show the importance of the method of writing in moving imagination in an interactive way, and what is related to human feelings in most, if not all, of its methods By studying the poetry of the believers in the Ahl al-Bayt, pea
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables