Water hyacinth (Eichhornia crassipes) is a free-floating plant, growing plentifully in the tropical water bodies. It is being speculated that the large biomass can be used in wastewater treatment, heavy steel and dye remediation, as a substrate for bioethanol and biogas production, electrical energy generation, industrial uses, human food and antioxidants, medicines, feed, agriculture, and sustainable improvement. In this work, the adsorption of Congo Red (CR) from aqueous solution onto EC biomass was investigated through a series of batch experiments. The effects of operating parameters such as pH (3-9), dosage (0.1-0.9 g. /100 ml), agitated velocity (100-300), size particle (88-353μm), temperature (10-50˚C), initial dye concentration (50-500) mg/l, and sorption–desorption were investigated to assess the efficiency of EC-elimination from aqueous solution. Different pre-treatments, alkali, and acid were achieved to increase the adsorption uptake. The optimum conditions for maximum removal of CR from an aqueous solution of 50 mg/L were as follows: pH (6), particle size (88 μm), stirring speed (200 rpm), and dose (0.3 g). The experimental isotherms data were analyzed using Langmuir, Freundlich, and Temkin isotherm equations and the results indicated that the Langmuir isotherm showed a better fit for CR adsorption with a higher adsorption uptake of 92.263mg/g, and the kinetic data were fitted well with pseudo-second-order kinetic model. Thermodynamic parameters were calculated from Van’t Hoff plot, confirming that the adsorption process was spontaneous and endothermic. Data show that the adsorption-desorption process lasts for four cycles before losing its efficiency and the recovery efficiency increased up to 76.63%.
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe disposal of the waste material is the main goal of this investigation by transformation to high-fineness powder and producing self-consolidation concrete (SCC) with less cost and more eco-friendly by reducing the cement weight, taking into consideration the fresh and strength properties. The reference mix design was prepared by adopting the European guide. Five waste materials (clay brick, ceramic, granite tiles, marble tiles, and thermostone blocks) were converted to high-fine particle size distribution and then used as 5, 10, and 15% weight replacements of cement. The improvement in strength properties is more significant when using clay bricks compared to other activated waste
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe formation of a Schiff-base with N2O2 donor atoms derived from the hydrazine segment and its metal complexes are reported. The Schiff-base ligand; N’-((1R,2S,4R,5S,Z)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)furan-2-carbohydrazide (HL) was prepared from the reaction of furan-2-carbohydrazide with (1R, 2R, 4R, 5S)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-one (M1) in ethanol medium. The reaction of the title ligand with selected metal ions Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II) gave complexes with the general formula [M(L)Cl2], (where: M = Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II)). Spectroscopic analyses Fourier transform infrared (FT-IR), Nuclear Magnetic Resonance (NMR) Carbon-13 nuclear magnetic res
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreColorectal cancer (CRC) is the most common disease and cause of death globally. The aim of the study is investigation and detection of some bacterial interfering with CRC occurrence and progression. The study conducted between September 2022 till February 2023, a total of 50 specimens were collected from confirmed CRC patients. In addition, 50 stool specimens were collected from Healthy volunteers, considers as control group. Isolation and identification of bacteria in all collected specimens were done by using cultural and differential media (blood agar, macconkey agar and Pfizer agar), as well as the VITEK- 2 compact system. The bacterial species, in the specimens of control were ( Escherichia coli 50 (86.20%), Klebsiella Pneumoni
... Show MoreCredit derivatives (CDs) have been increasingly acknowledged as an important requirement to hedge and transfer credit risk CR. Nonetheless, they have been extensively criticized for destabilizing the whole economic system bringing about the latest subprime credit crisis. The study’s main aim is to investigate the reason for the use of (CDs), whether it is used for hedging or trade purpose, for four of the US international financial institutions that had made it through the 2007 crisis to resume functioning post-crisis. This will be for three different and critical periods, namely the pre, during and after crisis periods (Q1, 2000-Q1, 2014). Adopting the SUR technique, the investigation of the factors that influence the net position of (CD
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More