Two types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentration of the adsorbate, contact time, adsorbent dosage and amount of coagulant salt(calcium sulphate) added . The adsorption data was modeled with Freundlich and Langmuir adsorption isotherms. and it was found that the adsorption process on activated carbon and zeolite fit the Freundlich isotherm model. The amount of oil adsorbed increased with increasing the contact time, but longer mixing duration did not increase residual oil removal from wastewater due to the coverage of the adsorbent surface with oil molecules. It was found that as the dosage of adsorbent increased, the percentage of residual oil removal also increased. The effects of adsorbent type and amount of coagulant salt(calcium sulphate) added on the breakthrough curve were studied in details in the column studies. Expanded bed behavior was modeled using the Richardson-Zaki correlation between the superficial velocity of the feed stream and the void fraction of the bed at moderate Reynolds number.
The importance of Baghdad city as the capital of Iraq and the center of the attention of delegations because of its long history is essential to preserve its environment. This is achieved through the integrated management of municipal solid waste since this is only possible by knowing the quantities produced by the population on a daily basis. This study focused to predicate the amount of municipal solid waste generated in Karkh and Rusafa separately, in addition to the quantity produced in Baghdad, using IBM SPSS 23 software. Results that showed the average generation rates of domestic solid waste in Rusafa side was higher than that of Al-Karkh side because Rusafa side has higher population density than Al-Karkh side. T
... Show MoreNanotechnology is a continually expanding field for its uses and applications in multiple areas i.e. medicine, science, and engineering. Biosynthesis is straightforward, less-toxicity, and cost-effective technology. TiO2 NPs biosynthesis has attained consideration in recent decades. In this study, probiotic bacteria were isolated from cow’s raw milk samples, and then were identified by using the Vitek2 system; as Leuconostoc spp. included Leuconostoc mesenteroides subsp. mesenteroides (Leu.1), Leuconostoc mesenteroides subsp. cremoris (Leu.4), and Leuconostoc pseudomesenteroides (Leu.14). All Leuconostoc spp. isolates showed an ability for TiO2 NPs bio-production, after being incubated at anaerobic conditions (30 o C/ 24 h) in DeM
... Show MoreDam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.