Abstract
The study of oxygen mass transfer was conducted in a laboratory scale 5 liter stirred bioreactor equipped with one Rushton turbine impeller. The effects of superficial gas velocity, impeller speed, power input and liquid viscosity on the oxygen mass transfer were considered. Air/ water and air/CMC systems were used as a liquid media for this study. The concentration of CMC was ranging from 0.5 to 3 w/v. The experimental results show that volumetric oxygen mass transfer coefficient increases with the increase in the superficial gas velocity and impeller speed and decreases with increasing liquid viscosity. The experimental results of kla were correlated with a mathematical correlation des
... Show MoreThe bifurcation of the constitutional rights of one of the techniques used by the constitutional court to expand the scope of the constitutional right to explicit, and access to the fact that guarantees constitutional rights, and establishes the constitutional elimination of this technique on a particular bond is the constitutional terms of reference, and in the light of his discretion in the exercise of the constitutional powers of , and tends at times To the adoption of a broad branching approach, which confers on the constitutional text containing constitutional rights a wider scope than the scope of an explicit right.
Recalcitrant adventitious root (AR) development is a major hurdle in propagating commercially important woody plants. Although significant progress has been made to identify genes involved in subsequent steps of AR development, the molecular basis of differences in apparent recalcitrance to form AR between easy-to-root and difficult-to-root genotypes remains unknown. To address this, we generated cambium tissue-specific transcriptomic data from stem cuttings of hybrid aspen, T89 (difficult-to-root) and hybrid poplar OP42 (easy-to-root), and used transgenic approaches to verify the role of several transcription factors in the control of adventitious rooting. Increased peroxidase activity was positively correlated with better rooting. We foun
... Show MoreThe current study investigated the stability and the extraction efficiency of emulsion liquid membrane (ELM) for Abamectin pesticide removal from aqueous solution. The stability was investigated in terms of droplet emulsion size distribution and emulsion breakage percent. The proposed ELM included a mixture of corn oil and kerosene (1:1) as a diluent, Span 80 (sorbitan monooleate) as a surfactant and hydrochloric acid (HCl) as a stripping agent without utilizing a carrier agent. Parameters such as homogenizer speed, surfactant concentration, emulsification time and internal to organic volume ratio (I/O) were evaluated. Results show that the lower droplet size of 0.9 µm and higher stable emulsion in terms of breakage percent of 1.12 % we
... Show MoreThe current study investigated the stability and the extraction efficiency of emulsion liquid membrane (ELM) for Abamectin pesticide removal from aqueous solution. The stability was investigated in terms of droplet emulsion size distribution and emulsion breakage percent. The proposed ELM included a mixture of corn oil and kerosene (1:1) as a diluent, Span 80 (sorbitan monooleate) as a surfactant and hydrochloric acid (HCl) as a stripping agent without utilizing a carrier agent. Parameters such as homogenizer speed, surfactant concentration, emulsification time and internal to organic volume ratio (I/O) were evaluated. Results show that the lower droplet size of 0.9 µm and higher stable emulsion in terms of breakage percent of 1.12 % were
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreA particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More