The present study explores the solar-induced photocatalytic degradation of reactive red (RR) and reactive turquoise (RT) dyes in a single system using TiO2 immobilized in xanthan gum (TiO2/XG), synthesized using the sol–gel dip-coating technique for direct precipitation. SEM-EDX, XRD, FTIR, and UV–Vis were used to assess the characteristics of the resulting catalyst. Moreover, the effects of different operating parameters, specifically pH, dye concentration, TiO2/XG concentration, H2O2 concentration, and contact time, were also investigated in a batch photocatalytic reactor. The immobilized TiO2/XG catalyst showed a slight adsorption degradation efficiency and then improved the RR and RT dye degradation activity (92.5 and 90.8% in 120 min) under solar light with a remarkable Langmuir–Hinshelwood pseudo-first-order degradation rate of 0.0183 and 0.0151 min−1, respectively, under optimum conditions of pH 5, dye concentration of 25 mg/L, TiO2/XG concentration of 25 mg/L, H2O2 concentration of 400 mg/L, and reaction time of 120 min. The improved photocatalytic ability was ascribed to the impact of TiO2/XG nanoparticles with a high surface area, and lower band gap energy. Solar light energy has significant potential for addressing energy deficit and water pollution concerns.
Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreA Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath