This study was done to find a cheap, available and ecofriendly materials that can remove eosin y dye from aqueous solutions by adsorption in this study, two adsorbent materials were used, the shells of fresh water clam (Cabicula fluminea) and walnut shells. To make a comparison between the two adsorbents, five experiments were conducted. First, the effects of the contact time, here the nut shell removed the dye quickly, while the C. flumina need more contact time to remove the dye. Second, the effects of adsorbent weight were examined. The nut shell was very promising and for all used adsorbent weight, the R% ranged from 94.87 to 99.29. However C. fluminea was less effective in removing the dye with R% ranged from 47.59 to 55.39. The third experiment was initial dye concentration. The C. fluminea showed very low ability to remove eosin y , while the nut shell was more effective in removing the dye with R% up to 97.36 and an inverse correlation between the increase of initial dye concentration and R%. The fourth experiment was the effect of pH value of the solution and the adsorbent particles size. The results show that fine particles were more effective than granular particles. Throughout the whole study, the walnut shell was very promising in removing the dye, while the C. fluminea shell was much less effective than the walnut shell.
Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
Background: Lymphomas are group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and caused the characteristics lymphadenopathy. Occasionally, they may spill over into blood or infiltrate organs outside the lymphoid tissue. The major subdivision of lymphomas is into Hodgkin lymphoma and non–Hodgkin lymphoma and this is based on the histologic presence of Reed-Sternberg cells in Hodgkin lymphoma. Salivary immunoglobulin A is the prominent immunoglobulin and is considered to be the main specific defense mechanism in oral cavity. The aim of this study was to determine the level of salivary immunoglobulin A in lymphoma patients before and after chemotherapy treatment. Subjects, materials and methods: The study i
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show More