Date stones were used as precursor for the preparation of activated carbons by chemical
activation with ferric chloride and zinc chloride. The effects of operating conditions represented
by the activation time, activation temperature, and impregnation ratio on the yield and adsorption
capacity towards methylene blue (MB) of prepared activated carbon by ferric chloride activation
(FAC) and zinc chloride activation (ZAC) were studied. For FAC, an optimum conditions of 1.25
h activation time, 700 °C activation temperature, and 1.5 impregnation ratio gave 185.15 mg/g
MB uptake and 47.08 % yield, while for ZAC, 240.77 mg/g MB uptake and 40.46 % yield were
obtained at the optimum conditions of 1.25 h activation time, 500 °C activation temperature, and
2 impregnation ratio. The equilibrium data for MB adsorption on prepared activated carbons at
optimum conditions were well represented by the Langmuir isotherm model, giving maximum
MB uptake of 304.51 and 387.54 mg/g for FAC and ZAC, respectively. Also, the results showed
that the surface area and iodine number of activated carbon prepared by activation with ferric
chloride at optimum conditions were 780.06 m2/g and 761.40 mg/g, respectively. While 1045.61
m2/g surface area and 1008.86 mg/g iodine number were obtained for ZAC prepared at optimum
conditions.
This paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation
... Show MoreBackground: Dental stone casts come into contact with impression materials and becomes susceptible to cross contamination from saliva and blood. This study was done to evaluate the physical and mechanical properties of dental stone type IV after treatments with various disinfecting agents and regimes (methods). Materials and Methods: Type IV dental stone and different types of disinfecting agents were used and divided into seven groups: G1: dental stone without disinfection (control group), G2: dental stone mixed with silver nitrate powder 0.5% , G3: dental stone mixed with silver nitrate powder 1%, G4: dental stone mixed with copper sulfate powder 0.5%, G5: dental stone mixed with copper sulfate powder 1% ,G6: dental stone immersed in prop
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreThe research included the preparation of cyclic compounds from thiazoles, imidazoles and oxazepines from the reaction of cyclization starting material that acts Schiff bases, which is a raw material in the formation of cyclic compounds from Schiff's(B1) by reaction of 4- aminobenzenesulfonylamide with 4-hydroxyacetophenone which can used to synthesized two lines. The first introducing the preparation of pyrazoles [B4, B5] from ester [B2], which derived to acid hydrazide[B3] with hydrazine hydrate and final pyrazoles obtained by the reaction with diethylmalonate and acetylacetone. The second including prepared the new 1,3-oxazepine1,5-dione derivatives[B6,B7,B8] from adding different anhydrides to the base[B1] as a seven membered ring ; te
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show More