The present study explores the solar-induced photocatalytic degradation of reactive red (RR) and reactive turquoise (RT) dyes in a single system using TiO2 immobilized in xanthan gum (TiO2/XG), synthesized using the sol–gel dip-coating technique for direct precipitation. SEM-EDX, XRD, FTIR, and UV–Vis were used to assess the characteristics of the resulting catalyst. Moreover, the effects of different operating parameters, specifically pH, dye concentration, TiO2/XG concentration, H2O2 concentration, and contact time, were also investigated in a batch photocatalytic reactor. The immobilized TiO2/XG catalyst showed a slight adsorption degradation efficiency and then improved the RR and RT dye degradation activity (92.5 and 90.8% in 120 min) under solar light with a remarkable Langmuir–Hinshelwood pseudo-first-order degradation rate of 0.0183 and 0.0151 min−1, respectively, under optimum conditions of pH 5, dye concentration of 25 mg/L, TiO2/XG concentration of 25 mg/L, H2O2 concentration of 400 mg/L, and reaction time of 120 min. The improved photocatalytic ability was ascribed to the impact of TiO2/XG nanoparticles with a high surface area, and lower band gap energy. Solar light energy has significant potential for addressing energy deficit and water pollution concerns.
The aim of the present study was to investigate the nephroprotective, hypolipidemic and hypoglycemic effects of Allium porrum (leek) in rabbits with cisplatin nephrotoxicity. Forty adult male New Zealand rabbits were divided randomly into four groups (ten rabbits in each group) as follows: Group I: (negative control) (C) received oral daily dose of distilled water for 15 successive days. Groups II: (Leek) (L) received oral daily dose of aqueous leek extract (500mg/kg/day) for 15 successive days. Group III: (positive control) [cisplatin (CP)] received oral daily dose of distilled water for 15 successive days, and subsequently administered single dose of Cisplatin (3.5mg/kg/day) by intraperitoneal injection from day 10 for five da
... Show MoreMethotrexate (MTX), a folic acid antagonist is widely used for the treatment of a variety of tumors. In the present study, the possible protective effect of aqueous green tea extract (AGTE) in methotrexate-induced haematotoxicity was investigated.Four main groups of white Albino rats were used: control group, (MTX) group, following a single dose of MTX (20 mg/kg, i.p.) saline was administered for 5 days. (AGTE) group, was treated with 1.25% concentration of AGTE only for 12 days and the (MTX+AGTE) group, in thism group rats received different concentrations of AGTE (0.625, 1.25 and 2.5%), as their sole source of drinking water, 7days before and 5 days after MTX treatment. MTX induced significant decreases in RBC, Hb, Hct, WBC and pl
... Show MoreHydrogen productions were achieved by irradiating ethanol ic aqueous solutions (20%. v/v) containing mixtures of the ligand 2,4- dimethoxybcnzylidene-2-hydroxy aniline (HL) or one of i ts complexes (ML2) wi th the following divalent ions: fVbl (II), Fc(IT), Co(II). Ni( rt ), Cu(H) and Zn (11), as photosensi1izers, methyl viol ogen (MY.:-) as electron acceptor. ethylene diamine  
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreThe Population growth and decay issues are one of the most pressing issues in many sectors of study. These issues can be found in physics, chemistry, social science, biology, and zoology, among other subjects.
We introduced the solution for these problems in this paper by using the SEJI (Sadiq- Emad- Jinan) integral transform, which has some mathematical properties that we use in our solutions. We also presented the SEJI transform for some functions, followed by the inverse of the SEJI integral transform for these functions. After that, we demonstrate how to use the SEJI transform to tackle population growth and decay problems by presenting two applications that demonstrate how to use this transform to obtain solutions.
Fin
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o