Preferred Language
Articles
/
joe-414
Coagulation - Flotation Process for Removing Oil from wastewater using Sawdust+ Bentonite
...Show More Authors

In many industries especially oil companies in Iraq consumed large quantities of water which will produce oil-contaminated water which can cause major pollution in agricultural lands and rivers. The aim of the present work is to enhance the efficiency of dispersed air flotation technique by using highly effective and cost-efficient coagulant to treating gas oil emulsion. The experimental work was carried out using bubble column made of Perspex glass (5cm I.D, 120cm height). A liquid was at depth of 60cm. Different dosage of sawdust +bentonite at ratio 2:1 (0.5+ 0.25; 1+ 0.5 and 2+1) gm and alum at concentration (10,20and30mg/l) at different pH ( 4 and 7) were used to determine optimum dosages of coagulant. Jar test experiment has showed that optimum dosage of (sawdust +bentonite) was (1+0.5gm) and alum concentration was 30 mg/l at pH=4.  

  The present study was conducted to evaluate the effect of various parameters pH (3, 4,7and 9); air flow rate (300, 500, 1000, and 1500 cc/min); initial oil concentration (300 up to 1000 ppm); concentration of Sodium dodecylsulphat surfactants ,SDS (25, 75and 150mg/l); and the effect of the addition coagulant (sawdust + bentonite at ratio 2:1) and alum (30mg/l) in the removal efficiency of oil from wastewater by coagulation –flotation process.

   The study has showed that the removal efficiency of COD, oil content and turbidity were related to the initial oil concentration; additive concentration of SDS and dosage of coagulants. It was found that the flotation rate increases when using coagulants, the fastest removal rate was obtained when pH 4 and also the higher removal efficiency achieved was for flotation (87%) and (95.7%) sawdust +bentonite; (97%) for alum in coagulation – flotation process.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Geographical Distribution of Power Plants in Iraq in 2015 Using Geographic Information Systems
...Show More Authors

The study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.

In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.

The most important results of the research are that there are a number of factors that led to the irregular distribution

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Adsorption of Indigo Carmen Dye by Using Corn Leaves as Natural Adsorbent Material
...Show More Authors

    In this paper, the ability of using corn leaves as low-cost natural biowaste adsorbent material for the removal of Indigo Carmen (IC) dye was studied. Batch mode system was used to study several parameters such as, contact time (4 days), concentration of dye (10-50) ppm, adsorbent dosage (0.05-0.25) gram, pH (2-12) and temperature (30-60) oC. The corn leaf was characterized by Fourier-transform infrared spectroscopy device before and after the adsorption process of the IC dye and scanning electron microscope device was used to find the morphology of the adsorbent material. The experimental data was imputing with several isotherms where it fits with Freundlich (R2 = 0.9937) and followed pseudo second order kinetic. The hi

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by surface chemical reactio

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Biofilm formation rate measurement in water and biomedical systems using photometric smartphones applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Aug 05 2015
Journal Name
International Journal Of Current Engineering And Technology
Water Quality Index Assessment using GIS Case study: Tigris River in Baghdad City
...Show More Authors

In this study water quality index (WQI) was calculated to classify the flowing water in the Tigris River in Baghdad city. GIS was used to develop colored water quality maps indicating the classification of the river for drinking water purposes. Water quality parameters including: Turbidity, pH, Alkalinity, Total hardness, Calcium, Magnesium, Iron, Chloride, Sulfate, Nitrite, Nitrate, Ammonia, Orthophosphate and Total dissolved solids were used for WQI determination. These parameters were recorded at the intakes of the WTPs in Baghdad for the period 2004 to 2011. The results from the annual average WQI analysis classified the Tigris River very poor to polluted at the north of Baghdad (Alkarkh WTP) while it was very poor to very polluted in t

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Performance Study of AODV, GRP and OSPFv3 MANET Routing Protocols Using OPNET Modeler
...Show More Authors

A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The accountancy Using of Gaols programming model to determine the optimal production mix
...Show More Authors

The research aims to determine the mix of production optimization in the case of several conflicting objectives to be achieved at the same time, therefore, discussions dealt with the concept of programming goals and entrances to be resolved and dealt with the general formula for the programming model the goals and finally determine the mix of production optimization using a programming model targets to the default case.

View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Solution of Riccati matrix differential equation using new approach of variational ‎iteration method
...Show More Authors

To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was ‎proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the ‎exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the ‎modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact ‎solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which ‎shows the reliability and applicability of the proposed approach. ‎

Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More