Preferred Language
Articles
/
joe-414
Coagulation - Flotation Process for Removing Oil from wastewater using Sawdust+ Bentonite
...Show More Authors

In many industries especially oil companies in Iraq consumed large quantities of water which will produce oil-contaminated water which can cause major pollution in agricultural lands and rivers. The aim of the present work is to enhance the efficiency of dispersed air flotation technique by using highly effective and cost-efficient coagulant to treating gas oil emulsion. The experimental work was carried out using bubble column made of Perspex glass (5cm I.D, 120cm height). A liquid was at depth of 60cm. Different dosage of sawdust +bentonite at ratio 2:1 (0.5+ 0.25; 1+ 0.5 and 2+1) gm and alum at concentration (10,20and30mg/l) at different pH ( 4 and 7) were used to determine optimum dosages of coagulant. Jar test experiment has showed that optimum dosage of (sawdust +bentonite) was (1+0.5gm) and alum concentration was 30 mg/l at pH=4.  

  The present study was conducted to evaluate the effect of various parameters pH (3, 4,7and 9); air flow rate (300, 500, 1000, and 1500 cc/min); initial oil concentration (300 up to 1000 ppm); concentration of Sodium dodecylsulphat surfactants ,SDS (25, 75and 150mg/l); and the effect of the addition coagulant (sawdust + bentonite at ratio 2:1) and alum (30mg/l) in the removal efficiency of oil from wastewater by coagulation –flotation process.

   The study has showed that the removal efficiency of COD, oil content and turbidity were related to the initial oil concentration; additive concentration of SDS and dosage of coagulants. It was found that the flotation rate increases when using coagulants, the fastest removal rate was obtained when pH 4 and also the higher removal efficiency achieved was for flotation (87%) and (95.7%) sawdust +bentonite; (97%) for alum in coagulation – flotation process.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Flow Measurements in Open Channels Using Integrating-Floats
...Show More Authors

The flow measurements have increased importance in the last decades due to the shortage of water resources resulting from climate changes that request high control of the available water needed for different uses. The classical technique of open channel flow measurement by the integrating-float method was needed for measuring flow in different locations when there were no available modern devices for different reasons, such as the cost of devices. So, the use of classical techniques was taken place to solve the problem. The present study examines the integrating float method and defines the parameters affecting the acceleration of floating spheres in flowing water that was analyzed using experimental measurements. The me

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Determine Optimal Preventive Maintenance Time Using Scheduling Method
...Show More Authors

In this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.

The method of estimating the distribution parameters for each device was the OLS method.

The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using panel data in structural equations with application
...Show More Authors

The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration.  chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 19 2021
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Object Tracking Using Adaptive Diffusion Flow Active Model
...Show More Authors

Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Sep 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction in Carbonate Reservoir Rock Using FZI
...Show More Authors

Knowledge of permeability, which is the ability of rocks to transmit the fluid, is important for understanding the flow mechanisms in oil and gas reservoirs.
Permeability is best measured in the laboratory on cored rock taken from the reservoir. Coring is expensive and time-consuming in comparison to the electronic survey techniques most commonly used to gain information about permeability.
Yamama formation was chosen, to predict the permeability by using FZI method. Yamama Formation is the main lower cretaceous carbonate reservoir in southern of Iraq. This formation is made up mainly of limestone. Yamama formation was deposited on a gradually rising basin floor. The digenesis of Yamama sediments is very important due to its direct

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Middle-east Journal Of Scientific Research
Question Classification Using Different Approach: A Whole Review
...Show More Authors

Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Hexapod Robot Static Stability Enhancement using Genetic Algorithm
...Show More Authors

Abstract

Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Enhancement of Atorvastatin Tablet Dissolution Using Acid Medium
...Show More Authors

         In this study some generic commercial products of Atorvastatin tablets were evaluated by dissolution test in acid medium by comparing with that of parent drug Lipitor of Pfizer Company. Some of solubilizing agents were studied in formulation  of Atorvastatin tablet including;  surface active agent  and PEG 6000 .The most effective factor was the  use of PEG6000 in formulation of Atorvastatin tablet which improved the dissolution and the results of dissolution profile of formulated tablet in this work  was bioequivalent to that of Lipitor .The quantitative analysis of this work was performed by using reversed phase liquid chromatography and a proper mixture of &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref