Reverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCGA) based optimisation framework to optimise the design and operational parameters of the process. To provide a deeper insight of the process to the readers, the influences of membrane design parameters on dimethylphenol rejection, water recovery rate and the level of specific energy consumption of the process for two different sets of operating conditions are presented first which were achieved via simulation. The membrane parameters taken into consideration include membrane length, width and feed channel height. Finally, a multi-objective function is presented to optimise the membrane design parameters, dimethylphenol rejection and required energy consumption. Simulation results affirmed insignificant and significant impacts of membrane length and width on dimethylphenol rejection and specific energy consumption, respectively. However, these performance indicators are negatively influenced due to increasing the feed channel height. On the other hand, optimisation results generated an optimum removal of dimethylphenol at reduced specific energy consumption for a wide sets of inlet conditions. More importantly, the dimethylphenol rejection increased by around 2.51% to 98.72% compared to ordinary RO module measurements with a saving of around 20.6% of specific energy consumption.
The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreThis investigation deals with the use of orange peel (OP) waste as adsorbent for removal of nitrate (NO3) from simulated wastewater. Orange peel prepared in two conditions dried at 60C° (OPD) and burning at 500 °C (OPB). The effect of pH: 2-10, contact time: 30- 180 min, sorbent weight: 0.5- 3.0 g were considered. The optimal pH value for NO3 adsorption was found to be 2.0 for both adsorbents. The equilibrium data were analyzed using Langmuir and Freundlich isotherm models. Freundlich model was found to fit the equilibrium data very well with high-correlation coefficient (R2). The adsorption kinetics was found to follow pseudo-second-order rate kinetic model, with a good correlation (R2
... Show MoreThe azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we
... Show MoreA total of 60 cotton swabs are collected from patients suffering from burn wound and surgical site infections admitted to Baghdad Teaching Hospital and Burn Specialist Hospital in Baghdad city during 9/2013 to 11/2013. All cotton swabs are cultured initially on blood agar and MacConkey agar and subjected for standard bacteriological procedures for bacteriological diagnosis. Twenty samples out of sixty are identified as Pseudomonas aeruginosa by conventional methods. The results of antibiotic susceptibility test illustrate that the antibiotics resistance rate of Pseudomonas aeruginosa isolates is as follows:100% (2020) for ceftriaxone, cefepime and carbencillin, 70% (14/20) for amikacin, 65%(13/20) for tobramycin, ceftazidim and gentamycin,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More