The removal of heavy metal ions from wastewater by ion exchange resins ( zeolite and purolite C105), was investigated. The adsorption process, which is pH dependent, shows maximum removal of metal ions at pH 6 and 7 for zeolite and purolite C105 for initial metal ion
concentrations of 50-250 mg/l, with resin dose of 0.25-3 g. The maximum ion exchange capacity was found to be 9.74, 9.23 and 9.71 mg/g for Cu2+, Pb2+, and Ni2+ on zeolite respectively, while on purolite C105 the maximum ion exchange capacity was found to be 9.64 ,8.73 and 9.39 for Cu2+, Pb2+, and Ni2+ respectively. The maximum removal was 97-98% for Cu2+ and Ni2+ and 92- 93% for Pb2+ on zeolite, while it was 93-94% for Cu2+, 96-97% for Ni2+, and 87-88% for Pb2+ on purolite C105. The obtained sorption affinity sequence was Cu 2+> Ni2+> Pb2+ in both resins.
Langmuir isotherm expressions were found to give better fit to the experimental data compared to Freundlich and BET models. Kinetic data correlated well with Lagergren first order kinetic model, indicating the reversible reaction with an equilibrium being established between liquid and solid phase.
ABSTRACT
The results showed that the organic fertilizer mixture (1:1) 30 tons/ha with chemical fertilization recorded the lowest level of bulk density of 1.2 g/cm3, the organic fertilizer mixture (1:1) 30 tons/ha with chemical fertilization recorded the highest percentage of aggregation stability amounting to 16.17%, the organic fertilizer palm fronds recorded the highest level of ready water with an average of 5.50 cm3/cm3 and the organic fertilizer mixture (1:1) 30 tons/ha without chemical fertilization recorded the highest level of ready water as it reached 6.93%, the or
... Show MoreThis Study aimed to studying the effect of Volatile oil extracted from the leaves of Myrtus communis on the growth and activities of the following types of bacteria: Staphylococcus aureus, Streptococcus pyogenes, Klebsilla pneumoniae, Pseudomonas aeruginosa, and the yeast Candida albicans. The results showed an inhibitory effect of the oil on both the growth and activity of the tested microbes. This was reflected by the minimum inhibitory concentration (MIC) of Staphylococcus aureus, Streptococcus pyogenes, Klebsilla pneumoniae, Pseudomonas aeruginosa which was: (2.5, 1.25, and 2.5,5 % respectively), and the yeast (5) %. Also, the Minimum bactericidal concentration (MBC) to the bacteria mentioned above was (5, 2.5,5,10 % respectivel
... Show MoreThis work is based on the synthesis of Cobalt(II) and Cadmium(II) mixed-ligands compounds obtained from the reaction of N'-(4-methylsulfanyl-benzoyl)-hydrazine carbodithioic acid methyl ester as a ligand and using ethylendiamine (en), 2,2'-bipyridine (bipy) or 1,10-phenanthroline (phen) as a co-ligand. The synthesis of ligand (HL) was based on multi-steps synthetic procedure. The reaction of 4-methylsulfanyl-benzoyl chloride with hydrazine gave 4-methylsulfanyl-benzoic acid hydrazide. This compound was reacted with carbon disulfide and potassium hydroxide in methanol to yield N'-(4-methylsulfanylbenzoyl)-hydrazine potassium thiocarbamate, which upon reaction with methyl iodide resulted in the formation of the ligand. A range of physico-chem
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.