The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of copper mass transfer across the membrane. As the applied voltage increased, the rate constant also increased. Additionally, increasing the pH of the solution led to an initial elevate in the rate constant, reaching a maximum value at pH 5, after which it started to decline. Moreover, higher initial copper concentrations had an adverse effect on the rate constant. Notably, the concentration decay profiles observed under different operating conditions followed first-order kinetics, with correlation coefficients exceeding 0.99. The elucidation of this discovery emanated from a remarkable and striking congruence between the experimental data and the mathematical underpinnings of the first-order kinetics model. This serendipitous alignment profoundly reinforced the robustness, veracity, and unwavering reliability of meticulously obtained results, amplifying the credibility and trustworthiness of the present comprehensive study.
The present study aim at preparing frusemide in liquid form suitable for oral use. This is achieved through preparing different liquid forms of frusemide. The frusemide liquid is prepared in the following forms: oral solution, syrup and elixir with intensity of 1, 0.4 and 0.8% weight /volume respectively and in combination with potassium carbonate, polysorbate 80, alcohol and phosphate buffer solution of pH8 to dissolve the frusemide in the above mentioned forms. The different forms of the prepared medicine have been stored in glass bottles that can provide protection against light and at 40, 50, 600C for four months. Besides the pH has been checked to decide the period of validity. The results show that the expiration date of
... Show MoreModified bentonite has been used as effective sorbent material for the removal of acidic dye (methyl orange) from aqueous solution in batch system. The natural bentonite has been modified using cationic surfactant (cetyltrimethyl ammonium bromide) in order to obtain an efficient sorbent through converting the properties of bentonite from hydrophilic to organophilic. The characteristics of the natural and modified bentonite were examined through several analyses such as Scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), and Surface area. The batch study was provided the maximum dye removal efficiency of 88.75 % with a sorption capacity of 555.56 mg/g at specified conditions (150 min, pH= 2, 250 rpm, and 0.
... Show MoreNanoparticles of copper sulfide have been prepared by simple reaction between using copper nitrate with different concentrations ratio 0.1, 0.3, and 0.5 mM, thiourea by a simple chemical route. The prepared Nano powders have been deposited onto glass substrates by casting method at 60°C. The structure of the product Nano- films has been studied by x-ray diffraction, where the patterns showed that all the samples have a hexagonal structure of covellite copper sulfide with the average crystalline sizes 14.07- 16.51 nm. The morphology has been examined by atomic force microscopy, and field emission scan electron microscopy. The AFM images showed particles with almost spherical and rod shapes with average diameter sizes of 49.11- 90.64 nm.
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More