Preparation and activation of activated carbon from waste materials-A review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
This paper gives information about different value added waste for preparation of activated carbon is used as adsorbent. There are different types of waste which can be converted into activated carbon by chemical activation using different activating agents like Cacl2, H2So4, H3Po4, KoH, and Zncl2.These activating agents are used by different investigators for activation of carbon prepared from waste at different performing conditions. Adsorption isotherms were developed by different authors with respect to their work.
Authors and Affiliations
Pratibha R. Gawande, Dr. Jayant P. Kaware
Research on Online Institute Solution Using RDBMS
implementation of student performance monitoring system is the web application on which the teacher are allow to insert the marks of the students obtain in the college exams which are visible to students through their l...
Survey on Design of Security Framework for Ads-B Based Systems
the requirement for increased surveillance due to increase in flight volume in the distanced area or oceanic regions outside the range of traditional radar coverage has been fulfilled by the advent of space-based automa...
Automatic Scheduling of Charging and Pushing Sequence of Coke Ovens
Most of the coke oven plants have the manual schedule for pushing and charging sequence of the coke ovens. The manual schedule gives rise to several problems which affect the process time and simultaneously affecting th...
Data Hiding in Encrypted Images by using Huffman coding algorithm
It is used for privacy, security, and protection. As the entropy of encrypted images is maximized, it is difficult to losslessly vacate room after encryption using the existing methods. In the proposed work, security an...
Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical...