Phenol oxidation by Fenton's reagent (H2O2 + Fe+2) in aqueous solution has been studied for the purpose of learning
more about the reactions involved and the extent of the oxidation process, under various operating conditions. An initial
phenol concentration of 100 mg/L was used as representative of a phenolic industrial wastewater. Working temperature
of 25C was tested, and initial pH was set at 5.6 . The H2O2 and the Fe+2 doses were varied in the range of
(H2O2/Fe+2/phenol = 3/0.25/1 to 5/0.5/1). Keeping the stirring speed of 200 rpm.
The results exhibit that the highest phenol conversion (100%) was obtained under (H2O/Fe+2/phenol ratio of 5/0.5/1)
at about 180 min. The study has indicated that Fenton's oxidation is first order with respect to the phenol concentration
and the rate constant K, was found to be 0.0325s-1 .
Cadmium element is one of the group IIB and classified as heavy metal and effects on human health and environment. The present work concerns with the biosorption of Cd(II) ions from aqueous solution using the outer layer of onions. Adsorption of the used ions was found to be pH dependent and maximum removal of the ions by outer layer of onions and was found to be 99.7%.
Inferential methods of statistical distributions have reached a high level of interest in recent years. However, in real life, data can follow more than one distribution, and then mixture models must be fitted to such data. One of which is a finite mixture of Rayleigh distribution that is widely used in modelling lifetime data in many fields, such as medicine, agriculture and engineering. In this paper, we proposed a new Bayesian frameworks by assuming conjugate priors for the square of the component parameters. We used this prior distribution in the classical Bayesian, Metropolis-hasting (MH) and Gibbs sampler methods. The performance of these techniques were assessed by conducting data which was generated from two and three-component mixt
... Show MoreBackground: Dentin removed during root canal system instrumentation for creating adequate geometry for the canal and cleaning the canal. A new instrument had been marketed with the aim of optimum shaping of all parts of the canal system, however, no information present about the amount of dentin removal compared to conventional rotary system. This study investigated the amount of dentin removal when the canal instrumented by SAF compared with ProTaper by using high resolution computed tomography (micro CT). Materials and Methods: Twenty extracted single canalled teeth were utilized for this study; and randomly divided into 2 groups. In the first group, the root canals were prepared by using protaper rotary system till F2 and the root canal
... Show MoreThis research presents a study of using an additive for the objective of increasing the setting time of a material used in several aspects in the constructional field, this material is “Local-Gypsum” which is locally called “Joss”, and the additive used in this study is “Trees Glue Powder” denoted by “TGP”. Nine mixtures of Local-gypsum (joss) had been experimented in the current study to find their setting time, these mixes were divided into three groups according to their water-joss ratios (W/J) (0.3, 0.4 and 0.5), and each group was sub-divided into three sub-groups according to their TGP contents (0.0%, 0.3% and 0.6%). It was found that, when TGP is added with the
In this paper, the Reliability Analysis with utilizing a Monte Carlo simulation (MCS) process was conducted on the equation of the collapse potential predicted by ANN to study its reliability when utilized in a situation of soil that has uncertainty in its properties. The prediction equation utilized in this study was developed previously by the authors. The probabilities of failure were then plotted against a range of uncertainties expressed in terms of coefficient of variation. As a result of reliability analysis, it was found that the collapse potential equation showed a high degree of reliability in case of uncertainty in gypseous sandy soil properties within the specified coefficient of variation (COV) for each property. When t
... Show MoreBackground: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja