Silica-based mesoporous materials are a class of porous materials with unique characteristics such as ordered pore structure, large surface area, and large pore volume. This review covers the different types of porous material (zeolite and mesoporous) and the physical properties of mesoporous materials that make them valuable in industry. Mesoporous materials can be divided into two groups: silica-based mesoporous materials and non-silica-based mesoporous materials. The most well-known family of silica-based mesoporous materials is the Mesoporous Molecular Sieves family, which attracts attention because of its beneficial properties. The family includes three members that are differentiated based on their pore arrangement. In this review, the major applications of the Mobil Mesoporous Molecular Sieves family, such as catalysts, adsorbents, and drug delivery agents, have been surveyed. Furthermore, the synthesis of the Mesoporous Molecular Sieves materials, the silica sources, the importance of templates, and the mechanisms of the synthesis are discussed herein. Members of this material family are characterized by many physicochemical properties that are closely related to their high silica content, crystalline structure, and pore arrangement. Commonly, the members of this family have large surface areas, high pore volumes, small pore sizes, and narrow and uniform particle size distributions. These properties enable numerous industrial applications and opportunities for scientific studies to further develop existing materials or manufacture new ones.
This paper presents the ability to use cheap adsorbent (corn leaf) for the removal of Malachite Green (MG) dye from its aqueous solution. A batch mode was used to study several factors, dye concentration (50-150) ppm, adsorbent dosage (0.5-2.5) g/L, contact time (1-4) day, pH (2-10), and temperature (30-60) The results indicated that the removal efficiency increases with the increase of adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature. An SEM device characterized the adsorbent corn leaves. The adsorption's resulting data were in agreement with Freundlich isotherm according to the regression analysis, and the kinetics data followed pseudo-first-or
... Show MoreThe discovery of novel therapeutic molecules is always difficult, and there are a variety of methodologies that use the most diverse and innovative medicinal chemistry approaches. One such approach is the deuteration technique: Deuteration is the process of substituting deuterium for hydrogen in a molecule. When compared to the drug molecule, its deuterated analogues may retain the features of the original molecule and, in some cases, improve its pharmacological activity, with fewer side effects and lower toxicity. Metronidazole is a commonly used antibiotic to treat anaerobic bacterial infections, protozoal and microaerophilic bacterial infections. Met
... Show MoreNew heterocyclic derivatives of quinoline are reported. Reaction of quinoline-2-thiol 4 with hydrazine hydrate gave 2-hydrazionoquinoline 5. Treatment of 5 with CS2 in pyridine afforded 1,2,4-triazolo-[4,3-a]- quinolin-1-2H-thione 6, whereas the reaction of 5 with carboxylic acids namely formic acid or acetic acid, yielded the 1,2,4-triazol-[4,3-a]-quinolin 7 or 5-methyl-1,2,4-triazolo [4,3-a]-quinoline 8 through ring closure. Diazotization of 5 under acidic conditions produced the fused tetrazole compound 9, tetrzolo-[1,5-a]- quinoline. Moreover, treatment of 5 with active methlyene compounds gave two pyrazole derivatives 10 and 11. Azomethines 12a-e were prepared through condensation of 5 with aromatic aldehydes or ketones.
Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show More