Due to the broad range uses of chromium for industrial purposes, besides its carcinogenic effect, an efficient, cost effective removal method should be obtained. In this study, cow bones as a cheap raw material were utilized to produce active carbon (CBAC) by physiochemical activation, which was characterized using: SEM to investigate surface morphology and BET to estimate the specific surface area. The best surface area of CBAC was 595.9 m2/gm which was prepared at 600 ᵒC activation temperature and impregnation ratio of 1:1.5. CBAC was used in aqueous chromium ions adsorption. The investigated factors and their ranges are: initial concentration (10-50 mg/L), adsorption time (30-300 min), temperature (20-50 ᵒC) and solution pH (2-11). Isotherm of adsorption and its kinetics were studied. The adsorption process was modeled statistically and was represented by an empirical model. Equilibrium data were fitted to the Langmuir and Freundlich isotherm models and the data best represented by Freundlich isotherm. Pseudo- first order and pseudo- second order kinetic equations were utilized to study adsorption kinetics, where chromium adsorption on CBAC fitted pseudo- second order fitted the data more adequately. The best removal efficiency was found to be 94.32%.
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreTolerance and its impact on building society
Research title: Ruling on abortion in Sharia and law.
The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.
The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.
The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va
... Show MoreIn this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show More