Industrial dyes are major pollutants in wastewater and river water with an initial visible concentration of 1 mg/L. Recent studies have shown the possibility of using polyphenol oxidase in catalytic biological treatment due to its ability to oxidize a large number of dyes and pollutants in wastewater and the flexibility to work in wide ranges of temperature, pH and salinity. It is easy availability as well as the low economic cost resulting from its use in biological treatments, this enzyme polyphenol oxidase was used. The findings in this study showed that the extraction of polyphenol oxidase (PPO) from potato peel was homogenized with potassium phosphate buffer (0.1 M, pH 7) at a ratio of 1:10 (weight: volume) for two min. The result of enzyme purification by ion exchange chromatography showed that the yield of this step was 64 % and the specific activity was 6541.67 U/mg. The polyphenol oxidase was immobilized covalently on the functionalized pumice stone (25.2 U/gm) compared with other methods. The characterization results demonstrated that the optimum pH for immobilized and free enzyme activity was 6.0 while the pH range of free and immobilized polyphenol oxidase stability was from 4.5 -7.0 and 3.5 - 8.5 respectively. The better temperature for free and immobilized polyphenol oxidase activity was 25 ºC, whereas the free and immobilized polyphenol oxidase was stable at 15-35 and 15-50 °C respectively. The outcomes showed that the decolorization efficiency of blue textile dye employing immobilized polyphenol oxidase reached 99.85 % after 24 hr. for 100 mg/L concentration while for other concentrations 200, 300, 400, 500 and 1000 mg/L the decolorization efficiencies were 85.96, 76.15, 72.54, 66.94 and 63.5 % respectively. Based on the results, the immobilized polyphenol oxidase on pumice stone is highly efficient in removing textile dyes at large concentrations and in different environmental conditions.
In the absence of environmental regulation, food stays to be contaminated with heavy metals, which is becoming a big worry for human health. The present research focusses on the environmental and health effects of irrigating a number of crops grown in the soils surrounding the Al-Rustamia old plant using treated wastewater generated by the plant. The physicochemical properties, alkalinity, and electrical conductivity of the samples were evaluated, and vegetable samples were tested for Cd, Pb, Ni, and Zn, levels, and even the transfer factor (TF) from soils to crops and crop and multi-targeted risk, daily intake (DIM) of metals, and health risk index (HRI) was calculated. The findings found that the average contents of Zn, Pb, Ni, an
... Show MoreDrilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More