Sorption is a key factor in removal of organic and inorganic contaminants from their aqueous solutions. In this study, we investigated the removal of Xylenol Orange tetrasodium salt (XOTS) from its aqueous solution by Bauxite (BXT) and cationic surfactant hexadecyltrimethyl ammonium bromide modified Bauxite (BXT-HDTMA) in batch experiments. The BXT and BXT-HDTMA were characterized using FTIR, and SEM techniques. Adsorption studies were performed at various parameters i.e. temperature, contact time, adsorbent weight, and pH. The modified BXT showed better maximum removal efficiency (98.6% at pH = 9.03) compared to natural Bauxite (75% at pH 2.27), suggesting that BXT-HDTMA is an excellent adsorbent for the removal of XOTS from water. The equilibrium data of XOTS adsorption on BXT and BXT-HDTMA surfaces were best fitted with the Freundlich isotherm model. The pseudo-second-order model provided very good fitting for the dye on the two surfaces. The error function, the sum of the absolute errors (SAE), was calculated to identify the best isotherm in this study. The thermodynamic parameters like ΔHº, ΔSº and ΔGº were also calculated. The adsorbent dosage weight and pH were found the most factors influencing the removal process.
The aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.
Abstract
In order to make an improvement associated with rotating biological contactor (RBC), a new design of biofilm reactor called as Rotating perforated disc biological contactor (RPBC) was developed in which the rotating discs are perforated. The transfer of oxygen from air to wastewater was investigated. Mass-transfer coefficient (KLa) in the liquid phase was determined by measuring the rate transfer of oxygen. A laboratory scale of (RPBC) consisted of a semicircular trough was used with a working capacity of 40 liters capacity of liquid. Synthetic wastewater was used as a liquid phase, while air was used as a gas phase.
The effects of m
... Show MoreReservoir simulation models are utilized by oil and gas companies with a purpose to develop fields. Expansions and improvements in simulation software have lessened the time to develop a model. Simulating the reservoir aims to realize fluid flow, physical, and chemical procedures happening in a hydrocarbon reservoir adequately well for the reason of improving hydrocarbon recovery under various working stipulations. Grid-orientation effects are complicated problem in numerical reservoir simulation. These influences were coming when utilized of numerical utilization mechanism to conditions characterizing physically inconstant displacement procedure. These impacts happen in an assortment
A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
This research presents a study in ultra-desulfurization of diesel fuel produced from conventional hydro desulfurization process, using oxidation and solvent extraction techniques. Dibenzothiophene (DBT) was the organosulfur compound that had been detected in sulfur removal. The oxidation process used hydrogen peroxide as an oxidant and acetic acid as homogeneous catalyst . The solvent extraction process used acetonitrile (ACN) and N-methyl – 2 - pyrrolidone (NMP) as extractants . Also the effect of five parameters (stirring speed :150 , 250 , 350 , and 450) rpm, temperature (30 , 40 , 45 , and 50) oC, oxidant/simulated diesel fuel ratio (0.5 , 0.75 , 1 , and 1.5) , catalyst/oxidant ratio(0.125,0.25,0.5
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show More