The present study investigates the application of a combined electrocoagulation-electrooxidation (EC-EO) process for the treatment of wastewater generated from Al-Dewaniya petroleum refinery plant in Iraq. The EC-EO process was examined in terms of its ability to simultaneously produce coagulant and oxidant agents by using a parallel plate configuration system composed of stainless steel plates as cathode and pair of aluminum and graphite plates as anode at two different current concentrations (1.92A/l and 0.96A/l). The results showed that the best conditions for treatment of Al-Dewaniya petroleum refinery wastewater using the combined approach were current concentration of (0.96A/l), current density of (12mA/cm2), NaCl concentration of (2g/l), pH of (7), and electrolysis time of (60 min). In this case COD removal efficiency (93.75%), phenol removal efficiency (96.20%), TDS removal efficiency (6.88%) were obtained with lower specific energy consumption (29.45 kWh/kg COD) and lower aluminum consumption (0.587 x10−3kg/h). The combined process showed to be better than EC process in term of COD and phenol removal efficiencies as well as aluminium consumption. In addition, it was better than EO in term of energy consumption. The combined process also gave buffering effect regarding to pH hence no need for controlling the pH during the operation.
NEACADEMY's JOURNALS
Abstract:
Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality managemen
... Show MoreWater samples were collected from output of water for Al-Wahda plant where located in al-karrada area in Baghdad city to study water contamination with bacteria, fungi and Algae. The study lasted one year started on August, 2016 to July,2017.Results were acquired according to two tests performed, the first is biological test included total coliform,E.coli, pseudomonas aeruginosa, total fungi, Diatom and non Diatom Algae and the second is physiochemical test included temperature, turbidity and residual chlorine. The results of bacteria were within the permitted specification in the Iraqi standards no. 14/2270 for the year 2015 except August was exceeded the permitted standard for total coliform, it was 1.1< cell/100 ml.Total Fungi, Dia
... Show MoreABSTRACTBackground : Acne vulgaris is a
common skin disease, affecting more than 85% of
adolescents and often continuing into adulthood.
People between 11 and 30 years of age and up to
5% of older adults. For most patients acne remains
a nuisance with occasional flares of unsightly
comedones, pustules and nodules. For other less
fortunate persons, the sever inflammatory response
to Propionibacterium acnes (P.acnes) results in
permanent
Methods: Disfiguring scars. (1, 2) Stigmata of sever
acne cane lead to social ostracism, withdrawal
from society and severe psychologic
depression (1-4).
Result Pathogenesis of acne Traditionally, acne
has been thought of as a multifactorial disease of
the fo
Background: Many structural or functional abnormalities can impair the production of thyroid hormones and cause hypothyroidism.Objectives: to identify the main etiological causes of hypothyroidism among patients visiting Specialized Center for Diabetes and Endocrinology.Methods: This study was conducted in the Specialized Center for Diabetes and Endocrinology on 217 patients with proved hypothyroidism, from 2006 to 2008. Every patient was tested with thyroid function tests, Ultrasound examination, thyroid autoantibodies, fine needle aspiration, radiology of skull, isotopes scan, also checking adrenal and gonadal function. Results: Out of these 217 patients 120 patients have thyroiditis 33 patients had been undergone thyroidectomy. 39 pat
... Show MoreKE Sharquie, AA Noaimi, SA Galib, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More