Treatment of a high strength acidic industrial wastewater was attempted by activated carbon
adsorption to evaluate the feasibility of yielding effluents of reusable qualities. The experimental
methods which were employed in this investigation included batch and column studies. The
former was used to evaluate the rate and equilibrium of carbon adsorption, while the latter was
used to determine treatment efficiencies and performance characteristics. Fixed bed and expanded
bed adsorbers were constructed in the column studies. In this study, the adsorption behavior of acetic acid onto activated carbon was examined as a function of the concentration of the adsorbate, contact time and adsorbent dosage. The adsorption data was modeled with Freundlich and Langmuir adsorption isotherms.The amount of acetic acid adsorbed increased with the decrease in initial concentration of acetic acid and increased with the increase in contact time and adsorbent dose. The effects of various
important and influencing parameters such as flow rate, bed height, inlet adsorbate concentration
on breakthrough curve are studied in details in the column studies.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreVerbal Antonyms: A research in the relationship in meaning Between the words in Arabic language
This research deals with the nature of the Turkish attitude towards the events of the Arab Spring which the Arab region witnessed recently, as this attitude is characterized by hesitation and utter confusion about those events at its beginning. However, the development of events and the consequent repercussions led the Turkish decision makers of the foreign policy to reconsider their attitude towards those events for political, economic, cultural and social motives.
In this paper the experimentally obtained conditions for the fusion splicing with photonic crystal fibers (PCF) having large mode areas were reported. The physical mechanism of the splice loss and the microhole collapse property of photonic crystal fiber (PCF) were studied. By controlling the arc-power and the arc-time of a conventional electric arc fusion splicer (FSM-60S), the minimum loss of splicing for fusion two conventional single mode fibers (SMF-28) was (0.00dB), which has similar mode field diameter. For splicing PCF (LMA-10) with a conventional single mode fiber (SMF-28), the loss was increased due to the mode field mismatch.
Background and objectives: P53 gene mutation and deletion are among the important molecular markers linked to lung cancer. In most cases, the inactivating mutations affecting both p53 alleles are acquired in somatic cells. Less commonly, the mutations are inherited ones. The aim of the present study was to analyze the frequency of having a wild and/or a mutated p53 gene in lung cancer compared to benign lung lesions and to relate these findings to different morphological types and grades of lung cancer.
Patients, materials and methods: In this retrospective study, the histopathology blocks of 30 lung cancer cases covering the period from2002 to 2007were obtained from the archives of the histopathology sec
Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou
... Show MoreDensely deployment of sensors is generally employed in wireless sensor networks (WSNs) to ensure energy-efficient covering of a target area. Many sensors scheduling techniques have been recently proposed for designing such energy-efficient WSNs. Sensors scheduling has been modeled, in the literature, as a generalization of minimum set covering problem (MSCP) problem. MSCP is a well-known NP-hard optimization problem used to model a large range of problems arising from scheduling, manufacturing, service planning, information retrieval, etc. In this paper, the MSCP is modeled to design an energy-efficient wireless sensor networks (WSNs) that can reliably cover a target area. Unlike other attempts in the literature, which consider only a si
... Show MoreBackground: Ureteric stones commonly have an impact on the quality of life of the patient. There are many treatment choices for the condition, including medical treatment, extra-corporeal shock wave lithotripsy (ESWL), endoscopic intervention by ureteroscope (URS), or surgery (open or laparoscopic). Semi-rigid URS with laser lithotripsy is used to fragment ureteric stones, especially those in the distal ureter.
Objectives: To assess the efficacy and complications of the dusting versus the fragmentation method for lower ureteric stones using holmium laser lithotripsy by analyzing intra-operative and post-operative variables.
Patients and methods: One hundred and twenty patie
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show More