The present work aims to study the possibility of utilization a forward osmosis desalination process as an alternative method to extract water from brine solution rejected from reverse osmosis process.
Experiments conducted in a laboratory–scale forward osmosis (FO) unit in cross flow flat sheet membrane cell yielded water flux ranging from (0.0315 to 0.56 L/m2 .min) when using CTA membrane,and ranging from (0.419 to 2.785 L/m2 .min) for PA membrane under 0.4 bar. Two possible membrane orientations were tested. Sodium chloride with high concentrations was used as draw solution solute. The effect of membrane orientation on internal concentration polarization (ICP) was studied. Two regimes of ICP; dilutive and concentrative were described and characterized and their governing equations were applied. Also the effect of draw and feed solution concentrations and flow rate were studied. It was found that the experimental water flux were lower than the theoretical water flux. Using of PA membrane under pressure was resulted in a higher flux of desalinated water than when CTA used alone without pressure
under the same operating conditions.
In this research, radon concentrations in some types of healthy drinking water samples available in Iraq's market were measured using a technique called Durridge RAD-7-H2O with closed loop. Then the rate of annual effective dose in human taken this water is determined.
It was found that, radon concentrations in studied samples ranged between 1.2 Bq.m-3 to 142 Bq.m-3. The results of the radon concentrations and the rate of annual effective dose for drinking water samples were significantly lower than the USEPA and WHO recommended limits that equal 500 Bq/m3 and 1 mSv/y resp
... Show MoreThis experiment was conducted in the orchard of the Department of Horticulture,college of Agriculture,Baghdad University during the growing season of 2007 To study the effects of spray with three concentration of cultar(0,500,1000 mg.L-1) ,tow concentration of K2SO4(0,5g.L-1), and salinity of irrigation water with three concentration (1,2,3dS.m-1) on some characteristics of vegetative growth of two cultivars of apricot trees (Labib1 and Zienni).The age of trees was four years .The tree grafted on original of seed apricot . Afactorial trail was carry out according to randomized complete block design with arrangement of split-split with three replications. Salinity of irrigation water took main plot, potassium took sub plot and cultar took s
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreThe natural polyphenolic compound that cinnamon contains is well known for its various biological activities, a broad variety of pharmacological and therapeutic properties. Diversified biomedical and pharmacological applications benefit from organic nanoparticles with controlled properties. Bioactive and non-toxic, cinnamon nanoparticles (CNPs) can be effective antibacterial agents. Driven by this idea, we prepared spherical CNPs using liquid (PLAL) pulse laser ablation technique and defined those NPs. Using Q-switched Nd : YAG With a wavelength of 1064 nm pulse laser of constant energy 500 mj , And different laser pulses ( 250 , 500 , 750 , 1000 ) pulse /sec a pure cinnamon target submerged in
... Show MoreThis study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar
... Show MoreIn this study three reactive dyes (blue B, red R and yellow Y) in single , binary and ternary solution were adsorbed by activated carbon AC in equilibrium and kinetic experiments. Surface area, Bulk and real density, and porosity were carried out for the activated carbon.
Batch Experiments of pH (2.5-8.5) and initial concentration (5-100) mg/l were carried out for single solution for each dye. Experiments of adsorbent dosage effect (0.1-1)g per 100 ml were studied as a variable to evaluate uptake% and adsorption capacity for single dyes(5, 10) ppm, binary and ternary (10) ppm of mixture solutions solution of dyes. Langmuir, and Freundlich, models were used as Equilibrium isotherm models for single solution. Extended Langmuir and Freun
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja