Two different polyvinyl alcohol/polyvinyl chloride (PVA/PVC) hollow fiber composite nanofiltration membranes were prepared after PVC hollow fiber membranes were coated using dip-coating method with PVA aqueous solution, which was composed of PVA, fatty alcohol polyoxyethylene ether (AEO9), and water [PVA/AEO9/water (4:0.5:95.5) wt%]. Effect of two different PVC hollow fiber immersion times in coating solution were studied. Cross-section, internal and external surfaces of the PVC hollow fibers and PVA/PVC composite nanofiltration membranes structures were characterized by scanning electron microscopy (SEM), pure water permeation flux and solutes rejection. It was found that, the coating layer thickness on the outer surface of the 19 wt% PVC hollow fiber was thin and about (6μm), while the coating solution penetrates through the outer edge of the PVC hollow fiber and it looks like sponge-like structure with increase of the dip-coating time from 20 to 30 sec. Besides, the pure water permeation flux decreases and solutes rejection increases with an increase of the coating time from 20 to 30 sec for the two PVA/PVC composite nanofiltration membranes. Molecular weight cut-off (MWCO) of the PVA/PVC composite nanofiltration membranes were in the range of NF (i.e. 200-3000 Mw).
Mass transfer was examined at a stationary rectangular copper electrode (cathode) by using the reduction of cupric ions as the electrochemical reaction. The influence of electrolyte temperature (25, 45, and 65 oC), and cupric ions concentration (4, 8, and 12 mM) on mass transfer coefficient were investigated by using limiting current technique. The mass transfer coefficient and hence the Sherwood number was correlated as Sh =
This study investigated the feasibility of anaerobic co-digestion of giant reed (GR) inoculated with waste manure as a co-substrate for biogas production. The performance of co-digestion was evaluated in 4 anaerobic digesters operated in batch mode at different conditions. The effects of alkali pretreatment with NaOH (4% w/v) solution, inoculum type, and thermal condition were studied. The results demonstrated that the alkali-pretreatment of GR enhanced the biogas generation by about 15% at mesophilic conditions. Thermophilic conditions enhanced the biogas recovery from both alkali-free and alkali pretreated GR by 15% and 127%, respectively. The kinetic study of the co-digestion process of GR for biogas recovery suggeste
... Show MoreThis research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
Longer follow-up defense , one of basketball skills that require the team collective action involving active part and consistent to acquire bouncing balls even not be a chance for members of the team striker acquisition rebounding from the target area and bring it back again , which reduces the chances of scoring, and it enables team members defender of the performance of fast attack and score points for being the increase your chances of success.In light of the foregoing, reflected the importance of research in achieving the objective basis of skill tests that require a circumstance similar to the circumstances of the game with the standard operating procedures for the registration, and that the validity judged by consistency between tests
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
High cost of qualifying library standard cells on silicon wafer limits the number of test circuits on the test chip. This paper proposes a technique to share common load circuits among test circuits to reduce the silicon area. By enabling the load sharing, number of transistors for the common load can be reduced significantly. Results show up to 80% reduction in silicon area due to load area reduction.
The road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.