Adsorption isotherms for activated carbon made from pecan shells have been obtained at 25 °C and an approximate pH of 3 for a number of metal ion solutes. It was found that the Slips and Freundlich equations were satisfactory for explaining the experimental data. The correlation of metal ion adsorption with the solute parameters of metal ion electronegativity and first stability constant of the metal hydroxide was investigated. In the case of most of the metal ions studied, higher electronegativities and stability constants corresponded to the higher adsorption levels of metal ions onto the activated carbon. A correlation was developed that predicts the constants of the Freundlich equation from the selected parameters of the metal ions, and thus can predict the adsorption isotherms at constant pH. The developed correlation gives results with acceptable deviations from experimental data. A procedure is proposed for obtaining similar correlations for different conditions (temperature, pH, carbon type and dosage). The ratio of equivalent metal ions adsorbed to protons released is calculated for the studied metal ions over a range of concentrations. In most cases, particularly at low concentrations, this ratio is close to one, confirming that ion exchange of one proton with one equivalent metal ion is the dominant reaction mechanism. 相似文献
Multimedia Tools and Applications - Image retargeting is the task of making images capable of being displayed on screens with different sizes. This work should be done so that high-level visual... 相似文献
International Journal of Information Security - The pervasive use of mobile technologies and GPS-equipped vehicles has resulted in a large number of moving objects databases. Privacy protection is... 相似文献
One of the biggest challenges in water quality monitoring is how to optimize big Data gathered from a wide range of resources. This paper presented a new software-based pathway of process mining approach for extending a flexible WQI (Water Quality Index) that would deal with uncertainties derived from missing data occurrence in short- and long-term assessments. The methodology is based on integration of four multi-criteria group decision-making models coupled with fuzzy simulation including AHP (Analytical Hierarchy Process), fuzzy OWA (Ordered Weighting Average), TOPSIS (Technique for Order Preference by Similarity to Ideal Solution), and fuzzy TOPSIS that were used for data mining and group consensus evaluation.. Examining the methodology on groundwater resources being supplied for drinking in Shiraz, Iran showed high integrity, accuracy, and proximity-to-real interpretation of water quality. This was the first study where decision-making risks such as Decision Makers’ risk-prone or risk-aversion attitudes (optimistic degree), DMs’ power, and consensus degree of each water quality parameter have been considered in WQI research. The proposed index offered a flexible choice in defining the intended project duration, stakeholders’ judgments, types of water use and water resource, standards, as well as type and number of water quality parameters. Thus, beside sustaining the unity in structure, this methodology could be suggested as a potentially WQI for other regions. The presented methodology would help more efficient monitoring of water resources for drinking purpose with respect to water quality.
ZnO deposition in porous γ-Al2O3 via atomic layer deposition (ALD) is the critical first step for the fabrication of zeolitic imidazolate framework membranes using the ligand-induced perm-selectivation process (Science, 361 (2018), 1008–1011). A detailed computational fluid dynamics (CFD) model of the ALD reactor is developed using a finite-volume-based code and validated. It accounts for the transport processes within the feeding system and reaction chamber. The simulated precursor spatiotemporal profiles assuming no ALD reaction were used as boundary conditions in modeling diethylzinc reaction/diffusion in porous γ-Al2O3, the predictions of which agreed with experimental electron microscopy measurements. Further simulations confirmed that the present deposition flux is much less than the upper limit of flux, below which the decoupling of reactor/substrate is an accurate assumption. The modeling approach demonstrated here allows for the design of ALD processes for thin-film membrane formation including the synthesis of metal–organic framework membranes. 相似文献
A bipartite state is classical with respect to party A if and only if party A can perform nondisruptive local state identification (NDLID) by a projective measurement. Motivated by this we introduce a class of quantum correlation measures for an arbitrary bipartite state. The measures utilize the general Schatten p-norm to quantify the amount of departure from the necessary and sufficient condition of classicality of correlations provided by the concept of NDLID. We show that for the case of Hilbert–Schmidt norm, i.e., \(p=2\), a closed formula is available for an arbitrary bipartite state. The reliability of the proposed measures is checked from the information-theoretic perspective. Also, the monotonicity behavior of these measures under LOCC is exemplified. The results reveal that for the general pure bipartite states these measures have an upper bound which is an entanglement monotone in its own right. This enables us to introduce a new measure of entanglement, for a general bipartite state, by convex roof construction. Some examples and comparison with other quantum correlation measures are also provided. 相似文献
Water Resources Management - This paper shows the utility of a new interval cooperative game theory as an effective water diplomacy tool to resolve competing and conflicting needs of water users... 相似文献
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity. 相似文献