The modified Hummers method was applied to prepare graphene oxide (GO) from the graphite powder. Tin oxide nanoparticles with different loading (10-20 wt.%) supported on reduced graphene oxide were synthesized to evaluate the oxidative desulfurization efficiency. The catalyst was synthesized by the incipient wetness impregnation (IWI) technique. Different analysis methods like FT-IR, XRD, FESEM, AFM, and Brunauer-Emmett-Teller (BET) were utilized to characterize graphene oxide and catalysts. The XRD analysis showed that the average crystal size of graphene oxide was 6.05 nm. In addition, the FESEM results showed high metal oxide dispersions on the rGO. The EDX analysis shows the weight ratio of Sn is close to its theoretical weight. The reduction of metal oxide and (GO) has occurred in one step at temperatures of 400 °C for 2 hours. The performance of the catalysts for dibenzothiophene (DBT) removal using H2O2 as an oxidizing agent was determined under a range of different operating conditions. The results showed that the maximum desulfurization was 71.68% in the best conditions (DBT concentration = 385 ppm, time = 90 min, temperature = 60 oC, catalyst dosage = 0.04g, and amount of oxidant = 0.375 ml).
Background: Mini implant stability is primarily related to local bone density; no studies have evaluated bone density related to mini implant placement for orthodontic anchorage between different age groups in the maxilla and the mandible. The present research aims to evaluate side, gender, age, and regional differences in bone density of the alveolar bone at various orthodontic implant sites. Materials and method: Fifty three individuals who were divided into two groups according to their age into: group I (ages 16-20 years) and group II (ages 21-29 years) had subjected to clinical examination, then 64-multislice computed tomography scan data were evaluated and bone density was measured in Hounsfield unit at 102 points (51 in the maxilla
... Show MoreIt is a common Knowledge that adverbs in Turkish languages can modify verbs, adjectives, nouns or other adverbs. Moreover, adverbs can determine the meanings of nouns and verbs in a sentence as far as time, place, manner, quantity and interrogative are concerned. The present study debates adverbs’ functions in Namiq Kamal’s play Vatan yahut Silistre.
The study sheds light on the author’s use of the adverbs to describe the required theatrical actions of the play and to convey his reflections and thoughts easily to the auidence. One of the main hindrances encountered in conducting the study is the shortage of the upto date academic resources necessary for
... Show MoreObjective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog
The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee