In the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative characterization of surface structure and morphology of the accumulated oxides. The energy dispersive X-ray (EDX) provided a semi-quantitative analysis of deposit composition. The atomic force microscopy (AFM) apparatus quantified the roughness. We examined the efficiency of composite electrodes in coinciding with the removal of Chemical Oxygen Demand (COD) under current densities of 40, 60, and 80 mA/cm2, pH values of 3, 4, and 5, and NaCl concentrations of 1, 1.5, 2 g/l. RSM covered the optimization of process parameters in conjunction with Central Composite Design (CCD). The COD represented the response function in the optimization procedure. The optimal current density, NaCl concentration, and pH magnitude were 80 mA/cm2, 1.717 g/l, and 3, respectively. The efficiency of COD elimination of 99.925% attained after 1 hour of indirect electrochemical oxidation with an energy consumption of 152.380 kWh per kilogram of COD. The COD elimination model is significant based on the correlation coefficient (R2) and F-values, and the experimental data fitted well to a second-order polynomial model with R2 of 98.93%.
New series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
Background: The scarce literature regarding oral hygiene attitude and periodontal awareness in Iraqi adults warranted the conduction of this study in order to provide a public profile and a baseline data for further researches. Aims of the study: assessing the oral hygiene attitude and periodontal awareness in a sample of Iraqi adults. Materials and Methods: Self-administered questionnaires were distributed to 500 adults. Results: Out of the 500 questionnaires distributed, 482 were included in the study.92% of the sample practiced tooth brushing, 69% out of them reported a daily brushing pattern with variable frequency,69% of the sample did not receive oral hygiene education from any source ,more than half of the sample 60 % used the hori
... Show MoreRutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperatur
... Show MoreSemiconductor quantum dots (QDs) have attracted tremendous attentions for their unique characteristics for solid-state lighting and thin-film display applications. A simple chemical method was used to synthesis quantum dots (QDs) of zinc sulfide (ZnS) with low cost. The XRD) shows cubic phase of the prepared ZnS with an average particles size of (3-29) nm. In UV-Vis. spectra observed a large blue shift over 38 nm. The band gaps energy (Eg) was 3.8 eV and 3.37eV from the absorption and photoluminescence (PL) respectively which larger than the Eg for bulk. QDs-LED hybrid devices were fabricated using ITO/ PEDOT: PSS/ Poly-TPD/ ZnS-QDs/ with different electron transport layers and cathode of LiF/Al layers. The EL spectrum reveals a bro
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreAbstract
The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.
Background: Biologically active substances, such as Cathepsin B (CAB) which is a lysosomalcystein protease may be involved in periodontal metabolism in the degradation of organic bone matrix containing collagen fibers in response to mechanical stress from orthodontic appliance. The aims of study were to determine and compare salivary levels of CAB, pH as well as clinical periodontal parameters (Plaque index PLI and gingival index GI) with different orthodontic force magnitudes at different time intervals. Materials and methods: A twenty-four patients (both gender) with age range (17-23) years had Angle's Class II division 1 malocclusion with GI >0.5 enrolled in this study. The level of salivary CAB and pH, in addition to the clinical period
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More