The current study was to examine the reliability and effectiveness of using most abundant, inexpensive waste in the form of scrap raw zero valent aluminum ZVAI and zero valent iron ZVI for the capture, retard, and removal of one of the most serious and hazardous heavy metals cadmium dissolved in water. Batch tests were conducted to examine contact time (0-250) min, sorbent dose (0.25-1 g ZVAI/100 mL and 2-8 g ZVI/100 mL), initial pH (3-6), pollutant concentration of 50mg/L initially, and speed of agitation (0-250) rpm . Maximum contaminant removal efficiency corresponding to (90 %) for cadmium at 250 min contact time, 1g ZVAI/ 6g ZVI sorbent mass ratio, pH 5.5, pollutant concentration of 50 mg/L initially, and 250 rpm agitation speed were obtained. Langmuir and Freundlich isotherms were presumed to fit the batch kinetics data for the sorption of Cd(II) onto ZVAI and/or ZVI and found that Langmuir (I) was the most representative model type with coefficient of determination R2 greater than 0.9115. Kinetics data for the sorption of Cd(II) onto ZVAI/ZVI mixture and due to the good agreement between the fitted and the experimental results; the data was found to obey the pseudo second order model. The scanning electron microscopy (SEM) for the ZVI and ZVAI was conducted before and after the sorbent-liquid reaction and revealed distinct morphological changes in the sorbent surface due to the contaminant saturation and pore channel blockages that ceased the sorption process.
(Sb2S3)1-xSnx thin films with different concentrations (0, 0.05 and
0.15) and thicknesses (300,500 and 700nm) have been deposited by
single source vacuum thermal evaporation onto glass substrates at
ambient temperature to study the effect of tin content, thickness and
on its structural morphology, and electrical properties. AFM study
revealed that microstructure parameters such as crystallite size, and
roughness found to depend upon deposition conditions. The DC
conductivity of the vacuum evaporated (Sb2S3)1-x Snx thin films was
measured in the temperature range (293-473)K and was found to
increase on order of magnitude with
Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreSuccessive waves and generations of terrorists attacked the Iraqis in the years following the fall of the regime in Iraq in 2003, after the US invasion of the country under the pretext of weapons of mass destruction. Hence, the Iraqi people enrolled in ongoing war with these armed groups which led to massive casualties due to blasts and missile injuries.
Mechanism of blasts injury can be classified into primary, secondary, tertiary, and quaternary. While bullet injuries can be classified into low and high-energy injuries, the type and severity of the injury will influence the type of management, together with facilities available in
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per
... Show MoreBackground: Semen contamination is a detrimental factor in decreasing fertility. Seasonal changes may affect the contamination, too. Objectives: This study was designed to detect semen contamination in ovine and caprine during different seasons. Methods: Six fully mature male sheep and goats were subjected to electro-ejaculator collection twice monthly from February 1, 2022, to January 31, 2023 (Spring, February 1, 2022-April 30, 2022; Summer, May 1, 2022, July 31, 2022; Autumn August 1, 2022, October 31, 2022; Winter November 1, 2022, January 31, 2023), for studying the seasonal effect. A total of 288 semen samples were collected from both species (36 samples from each per season). All samples were subjected to bacterial isolatio
... Show MoreEverybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show More