In this work the production of activated carbon (AC) from Imperata is done by microwave assisted Potassium hydroxide (KOH) activation and using this activated carbon for the purpose of the uptake of amoxicillin (AMX) by adsorption process from aqueous solution. The effects for irradiation power (450-800W), irradiation time (6-12min) as well as impregnation ratio (0.5-1 g/g) on the AMX uptake and yield AMX uptake at an initial concentration of AMX (150 mg/g). The optimum conditions were 700 W irradiation power, 10 min time of irradiation, as well as 0.8 g/g impregnation ratio with 14.821% yield and 12.456 mg/g AMX uptake. Total volume of hole and the area of the surface (BET) are 0.3027 m³/g, and 552.7638 m²/g respectively. The properties for the activated carbon were examined via Scanning Electron Microscopy (SEM).
The formulations and the properties of the Zinc Polycarboxylate Dental Cements are reviewed then new cements of this type are prepared with modified solid part of the cement. High silica glass powder with different particle sizes is prepared and added with different weight percentages to the zinc oxide. The liquid part of the prepared cements was merely 44% concentration of the polyacrylic acid. Accordingly, the usual and expensive additives to the liquid and solid part of the cement are eliminated. The working and setting times, compressive strength, flexural strength and modulus are measured according to ADA specifications. The formulated cement has long working times without much lengthening of the setting times. In addit
... Show MoreIn this study, the kinetics for the reaction of tert-butanol esterification with acetic acid in the presence of Dowex 50Wx8 catalyst was investigated. The reaction kinetic experiments were conducted in 1000 milliliter vessel at temperatures ranged from 50 - 80 oC, catalyst loading 25-50 g/L, and the molar ratios of acetic acid to tert-butanol from 1/3 – 3/1. The reaction rate was found to increase with increasing temperature and catalyst loading. It was also found the conversion of the tert-butanol increases as the molar ratio of acid to alcohol increases from 1/3 – 3/1. The Non-ideality of the liquid phase was taken into account by using activities instead of molar fractions. The activity coefficients were calculated according to th
... Show MoreLet be a connected graph with vertices set and edges set . The ordinary distance between any two vertices of is a mapping from into a nonnegative integer number such that is the length of a shortest path. The maximum distance between two subsets and of is the maximum distance between any two vertices and such that belong to and belong to . In this paper, we take a special case of maximum distance when consists of one vertex and consists of vertices, . This distance is defined by: where is the order of a graph .
In this paper, we defined – polynomials based on
... Show MoreThe research aims at:
- Identifying the problems facing kindergarten teachers.
- Identifying the nature of the problems facing kindergarten teachers.
To achieve the aim of the research, the researcher prepared a questionnaire to identify the problems that face the teachers of kindergartens. The questionnaire was subjected to the consultation of a group of specialized expertise in the educational and psychological sciences to certify the propriety of the items of the questionnaire and it gained a rate of (80%), and the stability of the scale gained (0.91) and it stands for a correlation parameter with a statistical significance and it was calculated by using Person’s R Corre
... Show MoreThe ion tail temperature of the comet ISON was calculated by using magneto-hydrodynamic MHD laws. From these equations the focus is concentrating on determine the ion tail temperature from the relations of dynamic and static pressures results.MHD equations are numerically solved using Matlab simulation code using cubic volume element method, based on three dimensionl Cartesian coordinates that devided into equal 15x15x15 equally spaced mesh. The simulation was performed using 3-D Lax explicit method considering normalised physical propreties relative to those of the solar wind at 1 AU. The results explained that it is possible to deduce two types of temperature, the first being the isotropic temperature which is shown to vary slowly with
... Show MoreThe cadastral map is very important because it has technical and materialist
specification of the property borders and these maps which are land registration
based on it in Iraq, the problem is an ancient maps and unfit for use, despite its
importance, Therefor the updating and digitize the cadastral map is very pivotal, this
is what we have done in the present work.
In the present work, we have an old cadastral map (as a paper) was made in 1932
with modern satellite image (Quick Bird ) 2006, which has 61 cm resolution for the
same area after. Geometric correction technique has been applied by using image-toimage
method or (image registration ) and after that we get new agricultural cadaster
map and connect the
In this paper, we define a new subclass of multivalent functions defined by the generalized integral operator with negative coefficients in the open unit disk U. We also give and study some interesting properties such as coefficient estimates, subordination theorems and integral means inequalities by using the famous Littlewood's subordination theorem. Finally, we conclude a type of inequalities that is upper bound and lower bound for topology multivalent functions of all analytic functions.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More<span>Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian
... Show More