Fatty Acid Methyl Ester (FAME) produced from biomass offers several advantages such as renewability and sustainability. The typical production process of FAME is accompanied by various impurities such as alcohol, soap, glycerol, and the spent catalyst. Therefore, the most challenging part of the FAME production is the purification process. In this work, a novel application of bulk liquid membrane (BLM) developed from conventional solvent extraction methods was investigated for the removal of glycerol from FAME. The extraction and stripping processes are combined into a single system, allowing for simultaneous solvent recovery whereby low-cost quaternary ammonium salt-glycerol-based deep eutectic solvent (DES) is used as the membrane phase. Moreover, for the first time, diethyl ether was introduced as a strip phase to strip the free glycerol in the BLM system. The effects of DES composition, DES …
In this research the specific activity of natural radionuclides 226Ra, 232Th and 40K were determined by sodium iodide enhanced by thallium NaI(TI) detector and assessed the annual effective dose in Dielac 1 and 2 and Nactalia 1 and 2 for children of less than 1 year which are available in Baghdad markets. The specific activity of 40K has the greater value in all the types which is in the range of allowed levels globally that suggested by UNSCEAR. The mean value of annual effective doses were 2.92, 4.005 and 1.6325 mSv/y for 226Ra, 232Th and 40K respectively.
In light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit
... Show MoreIn the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char
... Show MoreThermal energy storage is an important component in energy units to decrease the gap between energy supply and demand. Free convection and the locations of the tubes carrying the heat-transfer fluid (HTF) have a significant influence on both the energy discharging potential and the buoyancy effect during the solidification mode. In the present study, the impact of the tube position was examined during the discharging process. Liquid-fraction evolution and energy removal rate with thermo-fluid contour profiles were used to examine the performance of the unit. Heat exchanger tubes are proposed with different numbers and positions in the unit for various cases including uniform and non-uniform tubes distribution. The results show that
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More