The process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microsc
... Show MoreElectrochemical method was used to prepare carbon quantum dots (CQDs). Size of matter was nature when evaluate via X-ray diffraction (XRD). A distinct peak at 2θ equal to 31.6° and three other small peaks at 38.28°, 56.41° and 66.12° were observed. The measures of Fourier Transform Infrared Spectroscopy (FTIR) showed the bonds in the transmittance spectrum are manufactured with carbon nanostructures in view. The first peaks are the O–H stretching vibration bands at (3417 and 2922) cm−1, (C–O–H at 1400, and 1317) cm−1, (C–H), (C=C), (C–O–H), (C=O), and (C–O) bonds at 2850, 1668, 1101, and 1026 cm−1 sequentially. The transmission electron microscopy (TEM) results presented that the spherical CQDs are in shape and on a
... Show MoreThe process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (
... Show MoreTo enhance interfacial bonding between carbon fibers and epoxy matrix, the carbon fibers have been modified with multiwall carbon nanotubes (MWCNTs) using the dip- coating technique. FT-IR spectrum of the MWCNTs shows a peak at 1640 cm−1 corresponding to the stretching mode of the C=C double bond which forms the framework of the carbon nanotube sidewall. The broad peak at 3430 cm−1 is due to O–H stretching vibration of hydroxyl groups and the peak at 1712 cm−1 corresponds to the carboxylic (C=O) group attached to the carbon fiber. The peaks at 2927 cm−1 and 2862 cm−1 ar
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show More