In this paper activated carbon adsorbents produced from waste tires by chemical activation methods and application of microwave assisted KOH activation. The influence of radiation time, radiation power, and impregnation ratio on the yield and oil removal which is one of the major environmental issues nowadays and considered persistent environmental contaminants and many of them are suspected of being carcinogenic. Based on Box-Wilson central composite design, polynomial models were developed to correlate the process variables to the two responses. From the analysis of variance the significant variables on each response were identified. Optimum conditions of 4 min radiation time, 700 W radiation power and 0.5 g/g impregnation ratio gave 205.8749 mg/g oil removal and 35.19618 % yield. The characteristics of the AC were examined by pore structure analysis, and scanning electron microscopy (SEM).The BET surface area and total pore volume were identified to be 374.594 m²/g and 0.2039 m³/g, respectively.
Quantum calculations on the most stable structure were carried
out for calculating the electronic properties, energies and the charge
density at the Carbon and Hydrogen atoms by Semi-empirical
method (PM3) of zigzag carbon nano tube CNT (9,0) (SWCNTs), at
the equilibrium geometry depending on the pictures of Zigzag
CNT(9,0) which was found to has D3d symmetry point group by
applying for (Gaussian 2003) program. In this work the results
include calculation the relation for axial bonds length, which are the
vertical C-C bonds (annular bonds) in the rings and bonds length
which are in the outer ring that called the circumferential bonds. Also
include a different kind of vibration modes like breathing, puckering
by in situ polymerization of aniline monomer, conducting polyaniline (PANI) nanocomposites containing various concentrations of carboxylic acid functionalized multi-walled carbon nanotubes (f-MWCNT) were synthesized. The morphological and electrical properties of pure PANI and PANI /MWCNT nanocomposites were examined by using Fourier transform- infrared spectroscopy (FTIR), X-ray diffraction (XRD) and Atomic Force Microscopy (AFM) respectively. FTIR spectra shows that the carboxylic acid groups formed at the both ends of the sidewalls of the MWCNTs. The aniline monomers were polymerized on the surface of MWCNTs, depending on the -* electron interaction between aniline monomers and MWCNTs and hydrogen bonding into interaction between t
... Show MoreSeveral million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up to 10%. Whereas,
... Show MoreIn the present work, the possibility of treating many types of radioactive sources was examined practically. Six types of sealed radioactive sources were selected: 137Cs, 133Ba, 90Sr, 152Eu, 226Ra, and 241Am. The sources were exposed to a neutron flux emitted from 241Am/Be source for 33 days. The results showed a measurable reduction of activity for 226Ra, 241Am, and 152Eu, while the other radionuclides, 137Cs, 133Ba, and 90Sr, showed less response to neutron incineration.
Cloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.
... Show MoreCyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreIn this paper, the main work is to minimize a function of three cost criteria for scheduling n jobs on a single machine. We proposed algorithms to solve the single machine scheduling multiobjective problem. In this problem, we consider minimizing the total completion times, total tardiness and maximum tardiness criteria. First a branch and bound (BAB) algorithm is applied for the 1//∑Ci+∑Ti+Tmax problem. Second we compare two multiobjective algorithms one of them based on (BAB) algorithm to find the set of efficient (non dominated) solutions for the 1//(∑Ci ,∑Ti ,Tmax) problem. The computational results show that the algorithm based on (BAB) algorithm is better than the other one for generated the total number of
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreTask scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job
... Show More