The effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or
... Show MoreExploding wire Technique is a way for production metal and its compound nanoparticle that is capable of production of bulk amount at low cost semiconductor. In this work a copper iodine nanoparticles were fabricate by exploding copper wires with different currents in iodine solution. The produced samples were examined by XRD, FTIR, SEM and TEM to characterize their properties. The XRD proved the Nano-size for producer. The crystalline size increases with increasing current. FTIR measurements show a peaks located at 638.92 for Cu-I stretch bond indicate on formation of copper iodide compound and the peaks intensities increase with increasing current. The SEM and TEM measurements show that the thin films have nanostructures.
The kinetics of nickel removal from aqueous solutions using a bio-electrochemical reactor with a packed bed rotating cylinder cathode was investigated. The effects of applied voltage, initial nickel concentration, the rotation speed of the cathode, and pH on the reaction rate constant (k) were studied. The results showed that the cathodic deposition occurred under mass transfer control for all values of the applied voltage used in this research. Accordingly, the relationship between concentration and time can be represented by a first-order equation. The rate constant was found to be dependent on the applied voltage, initial nickel concentration, pH, and rotation speed. It was increased as the applied voltage increased and decreased as t
... Show MoreThe performance of a synergistic combination of electrocoagulation (EC) and electro-oxidation (EO) for oilfield wastewater treatment has been studied. The effect of operative variables such as current density, pH, and electrolyte concentration on the reduction of chemical oxygen demand (COD) was studied and optimized based on Response Surface Methodology (RSM). The results showed that the current density had the highest impact on the COD removal with a contribution of 64.07% while pH, NaCl addition and other interactions affects account for only 34.67%. The optimized operating parameters were a current density of 26.77 mA/cm2 and a pH of 7.6 with no addition of NaCl which results in a COD removal efficiency of 93.43% and a specific energy c
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos