The biochar prepared from sawdust raw material was applied in this study for the treatment of wastewater polluted with methyl orange dye. The effect of pH (2-11), initial concertation (50-250 mg/L) and time were studied. The isotherm of Langmuir, Frendluch and temkin models studied. The Langmuir model was the best to explain the adsorption process, maximum uptake was 136.67 mg/g at 25Co of methyl orange dye. Equilibrium reached after four hours of contact for most adsorbents.The values of thermodynamic parameters ∆G were negative at various temperatures, so the process spontaneous, while ∆H values were 16683 j/mol and ∆S values was 60.82 j/mol.k.
Rudimentary non-communicating functional uterine horn with unicornuate uterus, originating from anomalous embryological development of one Mullerian duct, is prone to different complications either at the gynecological or obstetrical level such as chronic pelvic pain, hematometra, subfertility and decreased quality of life. This unique case report presents a 14-year-old female with a history of severe chronic pelvic pain. She was diagnosed with Familial Mediterranean Fever (FMF) and had an appendectomy for suspected appendicitis within the symptoms’ interval. Ultrasound showed a right 5*6 cm right complex cystic mass assuming ovarian in place. She underwent a suspected endometrioma cystectomy operation and was diagnosed with left unico
... Show MoreA simple, environmental friendly and selective sample preparation technique employing porous membrane protected micro-solid phase extraction (μ-SPE) loaded with molecularly imprinted polymer (MIP) for the determination of ochratoxin A (OTA) is described. After the extraction, the analyte was desorbed using ultrasonication and was analyzed using high performance liquid chromatography. Under the optimized conditions, the detection limits of OTA for coffee, grape juice and urine were 0.06 ng g−1, 0.02 and 0.02 ng mL−1, respectively while the quantification limits were 0.19 ng g−1, 0.06 and 0.08 ng mL−1, respectively. The recoveries of OTA from coffee spiked at 1, 25 and 50 ng g−1, grape juice and urine samples at 1, 25 and 50 ng mL
... Show MoreThe term "nano gold," also known as "gold nanoparticles," is commonly used. These particles are extremely small, with a diameter of less than 100 nm, which is only a fraction of the width of a human hair. Due to their tiny size, nano gold particles are often found in a colloidal solution, where they are suspended in a liquid stabilizer. This colloidal gold is essentially another name for nano gold. The main method for producing gold nanoparticles in a colloidal solution is the citrate synthesis technique, which involves combining different solutions to precipitate the gold nanoparticles. In biological systems, copper complexes play a significant role at the active sites of many metalloproteins. These complexes have potential applications in
... Show MoreA simple, fast, selective of a new flow injection analysis method coupled with potentiometric detection was used to determine vitamin B1 in pharmaceutical formulations via the prepared new selective membranes. Two electrodes were constructed for the determination of vitamin B1 based on the ion-pair vitamin B1-phosphotungestic acid (B1-PTA) in a poly (vinyl chloride) supported with a plasticized di-butyl phthalate (DBPH) and di-butyl phosphate (DBP). Applications of these ion selective electrodes for the determination of vitamin B1 in the pharmaceutical preparations for batch and flow injection systems were described. The ion selective membrane exhibited a near-Nernstian slope values 56.88 and 58.53 mV / decade, with the linear dy
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More