The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from 0.5, 1, 1.5, 2, and 2.5 g/50 mL are the optimal manufacturing conditions for coated sand to guarantee an antibiotic removal efficiency greater than 80. After planting the LDH nanoparticles, characterization analyses revealed that the generation of a plate-like layer composed of loosely aggregated micrometric plates had significantly altered the structure of sand. Finally, as the sorbent mass increased as well as the flow rate and inlet contaminant concentration (Co) decreased, the longevity of coated sand in the packed column significantly increased. In comparison to the Belter-Cussler-Hu and Yan models, the Thomas-BDST model provides a more accurate simulation of measured breakthrough curves.
Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More