This study investigates the performance of granular dead anaerobic sludge (GDAS) bio-sorbent as permeable reactive barrier in removing phenol from a simulated contaminated shallow groundwater. Batch tests have been performed to characterize the equilibrium sorption properties of the GDAS and sandy soil in phenol-containing aqueous solutions. The results of GDAS tests proved that the best values of operating parameters, which achieve the maximum removal efficiency of phenol (=85%), at equilibrium contact time (=3 hr), initial pH of the solution (=5), initial phenol concentration (=50 mg/l), GDAS dosage (=0.5 g/100 ml), and agitation speed (=250 rpm). Fourier transform infrared (FTIR) analysis proved that the carboxylic acid, aromatic, alkane, alcohol, and alkyl halides groups are responsible for the bio-sorption of phenol onto GDAS.
A 2D advection-dispersion, solved numerically by computer solutions (COMSOL) Multiphysics 3.5a software which is based on the finite element method, has been used to simulate the equilibrium transport of phenol within groundwater. This model is taking into account the pollutant sorption onto the GDAS and sandy soil which is represented by Langmuir equation. Numerical and experimental results proved that the barrier plays a potential role in the restriction of the contaminant plume migration. Also, the barrier starts to saturate with contaminant as a function of the travel time. A good agreement between the predicted and experimental results was recognized with root mean squared error not exceeded the 0.055.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreEffective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul
Metal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show MoreThis research aims to identify the productive relationship nature among the elements used in the agricultural companies by estimating the translog cost function. It also aims to recognize the possibility of substituting these elements with each other, to identify the nature of revenues, and economies scale through elasticity of other cost. This research goes further to define the typical use of resources, identify the performance of the companies and their contribution in controlling their cost, and estimating elasticity of substitution (Allen-Uzawa), (Morishima). The translog cost function was estimated so as the total cost of the agricultural companies is a function of the prices of production and production quantity output el
... Show MoreA microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten
... Show MoreAPDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021
The study aims to know the role of governance in the consolidation of the principles of business ethics, through the application of the principles of governance and the dimensions of business ethics in the private sector. And knowledge of the validity of the hypothesis key of the current study according to which "increases the ethics of business organizations strength and coherence in the presence of the principles of governance" as it was distributed the questionnaire to a sample of a chairman and board members and managers department and heads of sections in some of the private banks. I have been using correlation analysis and regression testing (t) to see the moral differences and to find out the c
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More