Water contamination is a pressing global concern, especially regarding the presence of nitrate ions. This research focuses on addressing this issue by developing an effective adsorbent for removing nitrate ions from aqueous solutions. two adsorbents Chitosan-Zeolite-Zirconium (Cs-Ze-Zr composite beads and Chitosan-Bentonite-Zirconium Cs-Bn-Zr composite beads were prepared. The study involved continuous experimentation using a fixed bed column with varying bed heights (1.5 and 3 cm) and inlet flow rates (1 and 3 ml/min). The results showed that the breakthrough time increased with higher bed heights for both Cs-Ze-Zr and Cs-Bn-Zr composite beads. Conversely, an increase in flow rate led to a decrease in breakthrough time. Notably, Cs-Ze-Zr and Cs-Bn-Zr demonstrated impressive removal efficiencies, reaching 87.23% and 92.02%, respectively. The optimal conditions for peak performance were found to be an inlet flow rate of 1 ml/min, a bed height of 3 cm, and initial concentrations of 400 mg/L and 600 mg/L for Cs-Ze-Zr and Cs-Bn-Zr, respectively.
In this paper, the static analysis for finding the best location of boxes inside the composite wing-box structure has been performed. A software ANSYS (ver.11) was used to analyses the Aluminum wing to find the maximum stresses reached in. These results are used as a base for the composite wingbox to find the numbers of layers and location of the box beam and its dimensions so that the composite wingbox may carry the same loading conditions in the Aluminum wing. Analysis showed that a composite wingbox having two boxes is better than the single or triple boxes wing based on stress to weight ratio. Mass saving of (40%) had been achieved when composite wing-box is used instead of Aluminum wing.
Nanoencapsulation, employing safe materials, holds substantial promise for enhancing bioactive compounds’ delivery, stability, and bioactivity. In this study, we present an innovative and safe methodology for augmenting the incorporation of the anticancer agent, curcumin, thereby inducing apoptosis by downregulating miR20a and miR21 expression. Our established methodology introduces three pivotal elements that, to our knowledge, have not undergone formal validation: (1) Novel formulation: We introduce a unique formula for curcumin incorporation. (2) Biocompatibility and biodegradability: our formulation exclusively consists of biocompatible and biodegradable constituents, ensuring t
The paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.
In this paper, developed Jungck contractive mappings into fuzzy Jungck contractive and proved fuzzy fixed point for some types of generalize fuzzy Jungck contractive mappings.
The banking sector of all kinds is the backbone of the economy in all countries, as it is the main financier of most economic projects in order to achieve economic development and achieve stability, which contributes to providing the necessary resources in return for obtaining a profit margin in exchange for giving up his money and bearing credit risks. Among the aforementioned banking sectors are: Islamic banks that invest their capital in several forms in order to obtain profits that enable them to continue and grow, and the most important of these formulas is the Murabaha formula, which is summarized by the bank selling a commodity after owning it and then selling it to the applicant for this commodity based on a prior request
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreReferral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the and articles, as expressed by a particular client, and is a combination of affi
... Show More