In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best. The effect of temperature on the adsorption process was studied at the range (298-323) K. The test comes about were broken down by utilizing Freundlich and Tempkin isotherm models, where the Freundlich and Tempkin factors were determined, and it has been found that the adsorption isotherm obey the Freundlich isotherm. The effect of ionic strength on the adsorption process was studied also via sodium chloride electrolyte solution; the results have been revaled that the sodium ion has a positive impact on the adsorption process. The thermodynamic parameters are shown estimated as ∆H values were 2.8012 kJ mol-1 and 5.8252 kJ mol-1 for charcoal and rice husk, respectively; this behavior referred to endothermic adsorption.
The structural properties of ternary chalcopyrite AgAlSe2 compound alloys and thin films that prepared by the thermal evaporation method at room temperature on glass substrate with a deposition rate (5±0.1) nm s-1 for different values of thickness (250,500 and 750±20) nm, have been studied, using X-ray diffraction technology. As well as, the optical properties of the prepared films have been investigated. The structural investigated shows that the alloy has polycrystalline structure of tetragonal type with preferential orientation (112), while the films have amorphous structure. Optical measurement shows that AgAlSe2 films have high absorption in the range of wavelength (350-700 nm). The optical energy gap for allowed direct transition we
... Show MoreIn this work ester derivatives were synthesized by the reaction of imidazole derivatives (C1) with ethylchloroacetate in ethanol and NaOH to give the corresponding (C2) .While compound (C3) acetohydrazide was synthesized by the reaction of ester derivatives (C2) with hydrazine hydrat in ethanol. Compound (C3) from the reaction with different aromatic aldehydes in absolute ethanol gave the Schiff′s bases (C4,C5). The product compounds were characterized by FT-IR, U.V and 1HNMR spectra and the biological activities were studied as antibacterial.
Abstract
The main question raised in this paper is: Is it possible to translate the ‘genre’
of Quran? And if this ‘genre’ is Quran specific, a ‘genre’ of its own, i.e. a unique one,
how can the Quranic text be translated from Arabic into English or any other
language? This question has been raising a lot of controversy among translation
theorists, linguists, philosophers and scholars of Islam and specialists in the sciences
of Arabic language let alone Quran exegetes. Scholars of the Arabic language and
scholars of Islam have argued that because of the genre of Quran is the genre of (ijaz),
translatability can never be possible. Equivalence, thus, cannot be achieved especially
if we know that so far
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis study was conducted to evaluate the efficacy of Saccharomyces cerevesiae as a growth promoting agent in tomato. Soaking the seeds in yeast suspension at 5 g/L for 12h increased germination percentage, root length, root fresh and dry weight, plant height, foliage fresh and dry weight, attained 88.5% ; 8.1 cm ; 84.3 mg ; 7.03 mg ; 10.75 cm ; 839 mg and 37.75 mg compared with 80% ; 5.33 cm ; 39 mg ; 4.8 mg ; 7.35 cm ; 608 mg and 25.5 mg in seedlings grown from non treated seeds respectively. Similar results were obtained with seedling from seeds soaked in S. cerevesiae filtrate for 12 hrs. with values of 77.5% ; 6.875 cm ; 91.5 mg ; 7.5 mg ; 9.5 cm ; 777 mg and 40.35 mg compared to 66% ; 5.8 cm ; 57.7 mg ; 5.03 mg ; 5.9 cm ; 493 mg
... Show MoreIn the current analysis, the effects of circumferential scratches along the inner surface of a 170ᵒ -arc partial journal bearing has been numerically investigated. Their impact on the thermo-elasto-hydrodynamic performance characteristics, including maximum pressure, temperature, deformation, and stress, has been examined thoroughly. The ANSYS Fluent CFD commercial code was employed to tackle the iterative solution of flow and heat transfer patterns in the fluid film domain. They are then applied to the ANSYS Static Structure solver to compute the deformation and stress resulted in the solid bearing zone. A wide range of operating conditions has been considered, including the eccentricity ratio ( ) and scratch depth (
... Show MoreA solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar
air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.
This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.
The results show that the best chimney efficiency attaine
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More