Industrial dyes are major pollutants in wastewater and river water with an initial visible concentration of 1 mg/L. Recent studies have shown the possibility of using polyphenol oxidase in catalytic biological treatment due to its ability to oxidize a large number of dyes and pollutants in wastewater and the flexibility to work in wide ranges of temperature, pH and salinity. It is easy availability as well as the low economic cost resulting from its use in biological treatments, this enzyme polyphenol oxidase was used. The findings in this study showed that the extraction of polyphenol oxidase (PPO) from potato peel was homogenized with potassium phosphate buffer (0.1 M, pH 7) at a ratio of 1:10 (weight: volume) for two min. The result of enzyme purification by ion exchange chromatography showed that the yield of this step was 64 % and the specific activity was 6541.67 U/mg. The polyphenol oxidase was immobilized covalently on the functionalized pumice stone (25.2 U/gm) compared with other methods. The characterization results demonstrated that the optimum pH for immobilized and free enzyme activity was 6.0 while the pH range of free and immobilized polyphenol oxidase stability was from 4.5 -7.0 and 3.5 - 8.5 respectively. The better temperature for free and immobilized polyphenol oxidase activity was 25 ºC, whereas the free and immobilized polyphenol oxidase was stable at 15-35 and 15-50 °C respectively. The outcomes showed that the decolorization efficiency of blue textile dye employing immobilized polyphenol oxidase reached 99.85 % after 24 hr. for 100 mg/L concentration while for other concentrations 200, 300, 400, 500 and 1000 mg/L the decolorization efficiencies were 85.96, 76.15, 72.54, 66.94 and 63.5 % respectively. Based on the results, the immobilized polyphenol oxidase on pumice stone is highly efficient in removing textile dyes at large concentrations and in different environmental conditions.
The Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreDecision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .
In this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More