This research was aimed to study the efficiency of microfiltration membranes for the treatment of oily wastewater and the factors affecting the performance of the microfiltration membranes experimental work were includes operating the microfiltration process using polypropylene membrane (1 micron) and ceramic membrane (0.5 micron) constructed as candle; two methods of operation were examined: dead end and cross flow. The oil emulsion was prepared using two types of oils: vegetable oil and motor oil (classic oil 20W-50). The operating parameters studied are: feed oil concentration 50 – 800 mg/l, feed flow rate 10 – 40 l/h, and temperature 30 – 50 oC, for dead end and cross flow microfiltration.
It was found that water flux decreases with increasing operating time and feed oil concentration and increases with increasing operating temperature, feed flow rate and pore size of membrane. Also, it was found that rejection percentage of oil increases with increasing flow rate and rejection percentage decreases with increasing time, feed oil concentration, feed temperature and pore size of membrane for dead end and cross flow microfiltration. In cross flow microfiltration, reject concentration (concentrate) increases with increasing flow rate, feed concentration, time and feed temperature. The dead end filter has more flux compared to cross flow filter, while, in cross flow the oil rejection percentage is best than dead end. Flux for vegetable oil is more than motor oil but rejection percentage for vegetable oil is less than that for motor oil. The highest recovery ratio was found is 44.8% for cross flow process with recirculation of concentrating stream to feed vessel. The highest rejection percentage of oil was found is 98 % and 97.8 % for cross flow and dead ends respectively.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThe cost of pile foundations is part of the super structure cost, and it became necessary to reduce this cost by studying the pile types then decision-making in the selection of the optimal pile type in terms of cost and time of production and quality .So The main objective of this study is to solve the time–cost–quality trade-off (TCQT) problem by finding an optimal pile type with the target of "minimizing" cost and time while "maximizing" quality. There are many types In the world of piles but in this paper, the researcher proposed five pile types, one of them is not a traditional, and developed a model for the problem and then employed particle swarm optimization (PSO) algorithm, as one of evolutionary algorithms with t
... Show MoreThe importance of this study stems from the importance of preserving the environment and creating a clean sustainable environment from waste and emissions and all the operations of industrial companies in general and cement companies in particular by activating sustainability accounting standards. The research aims to identify and diagnose deviations in violation of sustainability standards by employing the non-renewable resources standard (NR0401) For the construction industries to create a sustainable audit environment, the deductive approach was followed in the theoretical side and the inductive and descriptive approach to the practical side. The most important results of the research were the possibility of applying sustainab
... Show MoreBig developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological.The research aims to Find the use of advanced manufacturing technologies that lead to customized production and quality appropriate whether they are low quality and low cost or low cost and suitable quality or high quality and high cost to win customer satisfaction.While the important conclusions is that the application of advanced manufacturing technology is not limited to techn
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreA fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreThe study aimed to identify the degree of academic leaders practices at the University of Northern Border for creative leadership, which attribute to different variables (nature of work, employer, gender, years of experience in administrative work at the university). To achieve the goal of the study, the researcher used the descriptive approach survey. Therefore, the researcher used a questionnaire as a study tool, which consisted of (40) items that included dimensions (sensitivity to problems, initiative, originality, flexibility). The study sample consisted of (240) participants included (agents of colleges, and supporting deanships, and their employees) during the second semester of the academic year 1439/1440 AH. The results showed t
... Show MoreThe present work establishes and validates HILIC strategies simple, accurate, exact and precise in pure form and inpharmaceutical dosage for separating and determining theophylline. These methods are developed on HILIC theophyllineseparation in columns ZIC2 and ZIC3. The eluent was prepared by mixing buffer (20% sodium acetate-40 mM, pH 5.5), 80%acetonitrile. The flow rate is 0.8 mL/min, with gradient elution and UV detection at 270 nm. In the ZIC2 and ZIC3 columns oftheophylline determining, the concentration range was 0.01-4μg.ml-1. The lower limit of detection and quantification fortheophylline were determined as 0.130, 0.190 μg.ml-1 and accuracy were 99.70%, 99.58% on ZIC2 and ZIC3, respectively. TheHILIC methods developed and validat
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show More