The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from 0.5, 1, 1.5, 2, and 2.5 g/50 mL are the optimal manufacturing conditions for coated sand to guarantee an antibiotic removal efficiency greater than 80. After planting the LDH nanoparticles, characterization analyses revealed that the generation of a plate-like layer composed of loosely aggregated micrometric plates had significantly altered the structure of sand. Finally, as the sorbent mass increased as well as the flow rate and inlet contaminant concentration (Co) decreased, the longevity of coated sand in the packed column significantly increased. In comparison to the Belter-Cussler-Hu and Yan models, the Thomas-BDST model provides a more accurate simulation of measured breakthrough curves.
This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThe rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end
... Show MoreThis paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application
... Show MoreAndalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBackground: Hormonal changes during pregnancy have been suggested to predispose women to gingivitis. Furthermore, advance periodontal infection in pregnant women may pose a threat to the placenta and uterus and may increase the like hood of preterm delivery. The aim of this study was to investigate the effect of salivary interleukin -6 (IL-6) level and periodontal health among preterm postpartum women. Materials and Methods: Salivary samples were taken from 33 preterm postpartum women (study group) and 33 full term postpartum women (control group). The supernatant salivary samples were assayed using atomic absorption spectrophotometer. Plaque, calculus and gingival indices were used for recording the oral hygiene and gingivitis also probing
... Show More