In this study, mesoporous silica (MPS) is made using the sol-gel method from a cheap source (Na2SiO3) using the surfactant hydroxycetyl hydroxyethyl dimonium chloride as a template. The task is the adsorption-based removal of the medication metoprolol (MP) at concentrations between 10 and 50 ppm. Variables such as: contact time, dose of adsorbent, starting concentration of adsorbate, and adsorption temperature were studied which show the equilibrium time and adsorbent dose are 40 min and 0.05 g respectively. The Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich isotherm models were fitted to the data obtained from the experiments. Comparing the outcomes showed that, of the four investigated isotherm models, the Freundlich equation m
... Show MoreIn low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreMetal oxide nanoparticles demonstrate uniqueness in various technical applications due to their suitable physiochemical properties. In particular, yttrium oxide nanoparticle(Y2O3NPs) is familiar for technical applications because of its higher dielectric constant and thermal stability. It is widely used as a host material for a variety of rare-earth dopants, biological imaging, and photodynamic therapies. In this investigation, yttrium oxide nanoparticles (Y2O3NPs) was used as an ecofriendly corrosion inhibitor through the use of scanning electron microscopy (SEM), Fourier transforms infrared spectroscopy (FT-IR), UV-Visible spectroscopy, X-ray diffraction (XRD), and energy dispersive X-ray spe
... Show MoreSo I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi
Frequency equations for rectangular plate model with and without the thermoelastic effect for the cases are: all edges are simply supported, all edges are clamped and two opposite edges are clamped others are simply supported. These were obtained through direct method for simply supported ends using Hamilton’s principle with minimizing Ritz method to total energy (strain and kinetic) for the rest of the boundary conditions. The effect of restraining edges on the frequency and mode shape has been considered. Distributions temperatures have been considered as a uniform temperature the effect of developed thermal stresses due to restrictions of ends conditions on vibration characteristics of a plate with different
... Show MoreLet R be a Г-ring, and σ, τ be two automorphisms of R. An additive mapping d from a Γ-ring R into itself is called a (σ,τ)-derivation on R if d(aαb) = d(a)α σ(b) + τ(a)αd(b), holds for all a,b ∈R and α∈Γ. d is called strong commutativity preserving (SCP) on R if [d(a), d(b)]α = [a,b]α(σ,τ) holds for all a,b∈R and α∈Γ. In this paper, we investigate the commutativity of R by the strong commutativity preserving (σ,τ)-derivation d satisfied some properties, when R is prime and semi prime Г-ring.
Osteoarthritis (OA) is the most common degenerative joint disorder that ultimately results in the progressive destruction of articular cartilage. The occurrence of knee osteoarthritis (OA) increases with obesity and is more common in women compared with men. Thirty patients (20 females, 10 males) clinically diagnosed with knee OA admitted to Baghdad teaching hospital between January 2015-June 2015. Patients between 35-70 year of age and 30 healthy subject (20 females, 10 males) ages matched. The results showed that increased body mass index (BMI) is a well-recognized risk factor for knee osteoarthritis, and the effect of obesity is a stronger predictor of developing knee OA symptoms in women than men. There was also a significant diffe
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More