Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series of experiments were conducted at constant mixing speed (300 revolutions per minute) to evaluate the effect of experimental factors likes, adsorption time, pH of diclofenac solution, diclofenac initial concentration, and dosage of activated carbon on removal efficiency. The design of experiments (version 13 Stat-Ease) was implemented using the central composite method to define the optimum effect of the process factors on the removal efficiency. The analysis of variance showed that the quadratic model for the experiment was significant with a very low probability value (P- value < 0.0001). The adjusted R2 of the model was 0.9826 and the predicted R2 was 0.9574. Whereas the optimum conditions suggested by the model for the process variable were found to be 150 min, 3.25 pH, 30 mg/L, 0.267g, for adsorption time, pH of diclofenac solution, diclofenac initial concentration, a dosage of activated carbon, respectively and the maximum removal efficiency was found to be 94.6%. The data obtained from the experiments were fitted with Langmuir and Freundlich models and the results show that the data was well fitted Langmuir model with R2 = 0.9685 as compared to the Freundlich model which has R2 = 0.93249. Likewise, the data was analyzed by pseudo first and second-order kinetic models and the results show that the adsorption on apricot-activated carbon was well adequate with the pseudo-second-order model.
Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog
The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show MoreThe purpose of this work is to clarify the effect of the Active Galactic Nucleus (AGN) on the properties of the galaxy. A photometric study of two galaxies by surface optical measurements techniques and by using'griz filters' was performed. The scientific material that used in this work was obtained from ''SLOAN DIGITAL SKY SURVEY'' (DR7), a fuzzy color, contour maps, photometric parameters, and color indices were studied by using surface photometric technique. The work was done by Ellipse task in IRAF (Image Reduction and Analysis Facility) software from the National Optical Astronomy Observatory (NOAO).
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More