A mixture of algae biomass (Chrysophyta, Cyanophyta, and Chlorophyte) has been investigated for its possible adsorption removal of cationic dyes (methylene blue, MB). Effect of pH (1-8), biosorbent dosage (0.2-2 g/100ml), agitated speed (100-300), particle size (1304-89μm), temperature (20-40˚C), initial dye concentration (20-300 mg/L), and sorption–desorption were investigated to assess the algal-dye sorption mechanism. Different pre-treatments, alkali, protonation, and CaCl2 have been experienced in order to enhance the adsorption capacity as well as the stability of the algal biomass. Equilibrium isotherm data were analyzed using Langmuir, Freundlich, and Temkin models. The maximum dye-sorption capacity was 26.65 mg/g at pH= 5, 250 rpm, 89μm, 25˚C, and 50 mg/L as initial concentration. Four kinetic models were tested, pseudo first order, pseudo second order, intra- particle diffusion and Elovich model. Taking into account the analysis of the (SSR and X2), the data were best fitted to Temkin isotherm model. The pseudo-second order with higher coefficient of determination fitted the data very well. Thermodynamic parameters (ΓG0, ΓH0, ΓS0, Ea and S*) at temperature ranges of 293–313 K demonstrated that biosorption is an endothermic, spontaneous reaction and higher solution temperature favors MB removal by adsorption onto algae biomass. Results show that adsorption- desorption process lasts for five cycle before losing its efficiency and the recovery efficiency increased up to 80.52%.
The present investigation is concerned primarily with sorting and identification of subfamily Tubificinae from River Tigris and some water surface in Baghdad /Iraq . For this purpose six study sites were chosen, including a Al- Kadhemyia drainage canal, North Baghdad; three sites on the shore of River Tigris; in addition to site in Al-Jaish canal , East Baghdad, finally the sixth site was from pond in Al-Zawra'a park , within the center of Baghdad .These sites were characterized by sediment rang from clay, silty-clay to silty with a percentage of organic matter ranged between 0.7% - 9.9% . According to water temperature, salinity and pH values, they were nearly identical in all study sites, the water temperature was ranged through the study
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreDerivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with app
... Show MoreLithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreThis paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation
... Show MoreBiological activity of the carotenoids which are produced fromchemically-mutaed local isolate of Rhodotorula mucilaginosawas studied. The results showed variation of inhibition activity of caritenoids against different types of pathogenic bacteria include, Staph aureus, E. coli, B. subtilis and Salmo. typh., the number declined from 2×107cell/ml to 2×104, 5×104, 2×105, 9×105 cell/ml respectively after 24hour. The produced carotenoids from alocal mutant Rhodotorula mucilaginosa revealed an antioxidant activity as free radical removal of 85.6%. Carotinoides revealed a highest stability in petroleum ether solvent for 30 days at room temperature. It found that the pigment was more stability in sesame oil compared with sun flower and coc
... Show MoreThe aim of the current research is to study the effect of adding green tea to the edible film prepared from the whey protein isolate on the effectiveness of microorganisms and evaluating the of antimicrobial effectiveness of these films on Iraqi soft cheese packaging during the nine days of storage as an alternative to commercial packaging. At the beginning of the study, the minimum inhibitory concentration was measured by calculate the diameter of the zone of inhibition on growth of the bacteria and it's included the group of Gram negative bacteria (Escherichia coli, Salmonella spp, Pseudomonas Aeruginosa) and the group of Gram positive bacteria (Staphylococcus Aureus, Bacillus spp) and a yeast (Candida Albican). Where the diameter of t
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More