Air stripping for removal of Trichloroethylene (TCE), Chloroform (CF) and Dichloromethane (DCM) from water were studied in a bubble column (0.073 m inside dia. and 1.08 m height with several sampling ports). The contaminated water was prepared from deionized water and VOCs. The presence of VOCs in feed solution was single, binary or ternary components. They were diluted to the concentrations ranged between 50 mg/l to 250 mg/l. The experiments were carried out in batch experiments which regard the bubble column as stirred tank and only gas was bubbled through stationary liquid. In this case transient measurements of VOC concentration in the liquid phase and the measured concentration profiles were modeled by bubble aeration model (BAM) to fit the experimental data fairly well. The results from batch experiments show that the removal efficiency of VOCs increases with increasing gas flow rate or gas holdup. It is found a pH=10 give the best removal rate, but all experiments were adjusted at pH=8 which allow to study other operating conditions. TCE is being removed faster than the other two components for all systems and a single component was removed faster than binary or ternary system. The KLa values were evaluated by fitting the BAM to the experimental data. It is found that KLa increased with increasing gas flow rate and TCE exhibits the highest KLa values.
In this paper, we propose a new and efficient ferroelectric nanostructure metal oxide lithium niobate [(Li1.075Nb0.625Ti0.45O3), (LNTO)] solid film as a saturable absorber (SA) for modulating passive Q-switched erbium-doped fiber laser (EDFL). The SA is fabricated as a nanocomposite solid film by the drop-casting process in which the LNTO is planted within polyvinylidene fluoride-trifluoroethylene [P(VDF-TrFE)] as host copolymer. The optical and physical characteristics of the solid film are experimentally established. The SA is incorporated within the cavity of EDFL to examine its capability for producing multi-wavelength laser. The experimental results proved that a multi-wavelength laser is produced, where stable four lines with central
... Show MoreMany purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreMultiphase flow is a very common phenomenon in oil wells. Several correlation models, either analytical or experimental, have been investigated by various studies to investigate this phenomenon. However, no single correlation model was found to produce good results in all flow conditions. 14 models available on the Prosper software were selected for the purpose of calculating the pressure gradient inside wells within a range of different flow conditions. The pressure gradient was calculated using Prosper software, then compared with the measured gradient based on the production log test (PLT) data. This study was conducted on 31 wells from five different oil fields (Kirkuk, Jambur, Bai-Hassan, Al-Ahdab, and Rumaila). It is worth noting t
... Show MoreDiscussion dealt with the independent factors critical such us success factors and the risk management process, and dependent factor of the general competitive strategies, and began searching the dilemma of thought, as crystallized his problem in the light of the need for organizations to philosophy and deeper vision of a more comprehensive understanding of the concept of risk management, assessment and management to maximize the competitive strategies of public, and on this basis, Search queries formulated problem of the gap between the knowledge-based intellectual propositions farcical for the purposes of interpretation of the relationship between the critical success factors and the risk
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreMulti-walled carbon nanotubes from cheap tubs company MWCNT-CP were purified by alcohol \ H2O2 \ separation funnel which is simple, easy and scalable techniques. The steps of purification were characterized by X-ray diffraction, Raman spectroscopy, scanning electron microscopy SEM with energy dispersive of X-ray spectroscopy EDX and surface area measurements. The technique was succeeded to remove most the trace element from MWCNT-CP which causing increase the surface area. The ratios of impurities were reduced to less 0.6% after treatment by three steps with losing less than 5% from MWCNT-CP.
Nowadays, 3D content is becoming an essential part of multimedia applications, when the 3D content is not protected, hackers may attack and steal it. This paper introduces a proposed scheme that provides high protection for 3D content by implementing multiple levels of security with preserving the original size using weight factor (w). First level of security is implemented by encrypting the texture map based on a 2D Logistic chaotic map. Second level is implemented by shuffling vertices (confusion) based on a 1D Tent chaotic map. Third level is implemented by modifying the vertices values (diffusion) based on a 3D Lorenz chaotic map. Results illustrate that the proposed scheme is completely deform the entire 3D content accord
... Show More