The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of copper mass transfer across the membrane. As the applied voltage increased, the rate constant also increased. Additionally, increasing the pH of the solution led to an initial elevate in the rate constant, reaching a maximum value at pH 5, after which it started to decline. Moreover, higher initial copper concentrations had an adverse effect on the rate constant. Notably, the concentration decay profiles observed under different operating conditions followed first-order kinetics, with correlation coefficients exceeding 0.99. The elucidation of this discovery emanated from a remarkable and striking congruence between the experimental data and the mathematical underpinnings of the first-order kinetics model. This serendipitous alignment profoundly reinforced the robustness, veracity, and unwavering reliability of meticulously obtained results, amplifying the credibility and trustworthiness of the present comprehensive study.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreKE Sharquie, AA Noaimi, MM Al-Salih, Saudi Medical Journal, 2008 - Cited by 56
Back ground: Zygote produce from once a sperm fertilizes an egg cell. Then, the zygote (unicellular) will begin chain of cellular cleavages to produce multicellular mass, its embryo, the differentiated to different tissues and organism. The development of the embryo is called embryogenesis. Coenzyme Q10, is an antioxidant produced in the body. It boosts cellular energy and may enhance the immune system. CoQ10 is present and measurable in seminal fluid, the concentration of CoQ10 directly correlates with both sperm count and motility. It is beneficial in the prevention and treatment a wide range of health problems. Objectives: The present study was aimed to investigate the possibility of using coenzyme Q10 to improve in vitro fertilization (
... Show MoreThe efficiency of egg yolk emulsion in coating DNA and its delivery across cellular membranes was evaluated in comparison with liposomes DOPE . The murine leukemia viral oncogene v-abl , cloned on pBR322 was used as a DNA substrate for direct injection into mice tissue . the DNA complexes were prepared by mixing the DNA with egg yolk emulsion and liposome . Each was directly injected into mice peritoneal cavity with proper control. The gene delivery was examined phenotypically by blood analysis and cytogenetic analysis . Chromosomal changes were detected in the bone marrow as from the fourth day post inoculation through the eleventh day when chromosomal ring s could be seen . this was accompanied by decrease in the WBC count ,
... Show MoreAn efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreS Khalifa E, N Adil A, AS Mazin M…, 2008