Different compositions of hydrogels composed of mathacrylamide homopolymer (60 and 90% of PMAM) were prepared using the free radical polymerization technique, with and without methylene bisacrylamide as crosslinker (0 and 3%). Several parameters and properties were studied to evaluate their performance as oil/water separators. Many parameters are used, such as residual oil in water, water recovery, separation time, hydrogels coated percentages, swelling parameters, mechanical properties, microscopic and photographic images, and scanning electron microscopy. The results showed that water recovery (87-97), Separation efficiency (96.2-99.6 %), separation time (6-9.5 min.), hydrogels coated percentages (18-23 %), water content (70-97 %), and tensile test (63-90 MPa). The effect of polymer crosslinking density, mesh pore size, and polymer composition on the parameters and properties mentioned above were also studied. The results showed that the separation efficiency of 1000 micron mesh composite is better than 500-micron mesh composites.
Abstract
Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.<
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this research, the performance of a two kind of membrane was examined to recovering the nutrients (protein and lactose) from the whey produced by the soft cheese industry in the General Company for Food Products inAbo-ghraab.Wheyare treated in two stages, the first including press whey into micron filter made of poly vinylidene difluoride (PVDF) standard plate type 800 kilo dalton, The membrane separates the whey to permeate which represent is the main nutrients and to remove the fat and microorganisms.The second stage is to isolate the protein by using ultra filter made of polyethylsulphone(PES)type plate with a measurement of 10,60 kilo dalton and the recovery of lactose in the form of permeate.
The results showed that the percen
In this paper, a fusion of K models of full-rank weighted nonnegative tensor factor two-dimensional deconvolution (K-wNTF2D) is proposed to separate the acoustic sources that have been mixed in an underdetermined reverberant environment. The model is adapted in an unsupervised manner under the hybrid framework of the generalized expectation maximization and multiplicative update algorithms. The derivation of the algorithm and the development of proposed full-rank K-wNTF2D will be shown. The algorithm also encodes a set of variable sparsity parameters derived from Gibbs distribution into the K-wNTF2D model. This optimizes each sub-model in K-wNTF2D with the required sparsity to model the time-varying variances of the sources in the s
... Show MoreA novel demountable shear connector for precast steel‐concrete composite bridges is presented. The connector uses high‐strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents slip of bolts within their holes. Moreover, the connector promotes accelerated construction and overcomes typical construction tolerances issues of precast structures. Most importantly, the connector allows bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (i) precast deck panels can be rapidly uplifted and replaced; (ii) connectors can be rapidly removed and replaced; and (iii) steel beams can b
... Show More