The removal of heavy metal ions from wastewater by sorptive flotation using Amberlite IR120 as a resin, and flotation column, was investigated. A combined two-stage process is proposed as an alternative of the heavy metals removal from aqueous solutions. The first stage is the sorption of heavy metals onto Amberlite IR120 followed by dispersed-air flotation. The sorption of metal ions on the resin, depending on contact time, pH, resin dosage, and initial metal concentration was studied in batch method .Various parameters such as pH, air flow rate, and surfactant concentration were investigated in the flotation stage. Sodium lauryl sulfate (SLS) and Hexadecyltrimethyl ammonium bromide (HTAB) were used as anionic and cationic surfactant respectively. The sorption process, which is PH dependent, shows maximum removal of metal ions at pH 7. Langmuir and Freundlich isotherm expressions were found to give both a good fit to the experimental data. Kinetic data correlated well with Lagergren second order kinetic model, and flotation step enhanced the removal efficiency of nickel and cadmium from wastewater from about 75% to 94% and reduce turbidity so it can dispense with the filtering process, which is expensive technology. It is believed that flotation separation has great potential as a clean water and wastewater treatment technology.
A plant mixture containing indigenous Australian plants was examined for synergistic antimicrobial activity using selected test microorganisms. This study aims to investigate antibacterial activities, antioxidant potential and the content of phenolic compounds in aqueous, ethanolic and peptide extracts of plant mixture
Well diffusion, minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) assays were used to test antibacterial activity against four pathogenic bacteria namely
Amoxicillin 1 was treated with thiosemicarbazide and Phosphoryl chloride to obtain a new derivatives that contains 1,3,4-thiadiazole moiety 2. Schiff bases compounds were synthesized by the reaction of compound 2 with different aldehydes such as benzaldehyde and some substituted Benzaldehyde; p-hydroy, p-Chloro, p-Nitro, p-Dimethylamino, p-Methyl, p-Methoxy, p-Ethoxy to give compounds 3a-h. The obtained compounds have tested towards gram -ve and gram +ve bacteria. The compound shows good to moderate result towards the bacteria.
In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreAbstract
Knowing the amount of residual stresses and find technological solutions to minimize and control them during the production operation are an important task because great levels of deformation which occurs in single point incremental forming (SPIF), this induce highly non-uniform residual stresses. In this papera propose of a method for multilayer single point incremental forming with change in thickness of the top plate (0.5, 0.7, 0.9) mm and lubrication or material between two plates(polymer, grease, grease with graphite, mos2) to knowing an effect of this method and parameters on residual stresses for the bottom plates. Also compare these results for the
... Show MoreThis new azo dye 3-((2-(1H-indol-3-yl) ethyl) diazenyl) quinoline-2-ol was subsequently used to prepare a series of complexes with the metal ions of Cr+3, Cu+2, VO+2, Mn+2and Mo+6. The compounds identified by 1H and 13C-NMR, FT-IR, UV-Vis, mass spectroscopy, as well as TGA, DSC, and C.H.N., conductivity, magnetic susceptibility, metal and chlorine content. The results showed that the ligand behaves in a bidantate, and that the complexes gave octahedral, excepting for VO+2 square pyramid was given, that all complexes are non-electrolytes. The effectiveness of mention the compounds in inhibiting free radicals was evaluated by the ability to act as an antioxidant was measured using DPPH as a free radical and gallic acid as a standard s
... Show More