Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Part I Process Schematic:

A fermentation broth being produced at the rate of 1500 liter/hr has two extracellular products of interest, a monoclonal antibody of molecular weight 145,000 and a small molecular weight product (M.W. 300). The broth also has a coloring contaminant of molecular weight 250 at the level of 0.4 wt%. The monoclonal antibody is present at the level of 1 mg/ml of solution; the 300 M.W. product is present at the level of 3 gm/liter. It is  known that if the coloring contaminant level can be reduced by 200 times then the monoclonal antibody product will be okay; similarly for the small molecular weight product vis-à-vis the monoclonal antibody product (which will be ultimately purified by ion exchange chromatography; but that is not your concern). On the other hand, an adsorption process is available for  purifying the smaller molecular weight product vis-à-vis the coloring contaminant which is adsorbed by the adsorbent. The bed loaded with the coloring contaminant  is regenerated by an aqueous stream having a different temperature. The fermentation broth clarification is to be done either by a filter press (or a rotary vacuum filter) or a cylindrical centrifuge. Your process schematic must show both clarification methods as alternate ways of clarifying the fermentation broth. After the coloring contaminant is substantially removed, the final purification of the 300 dalton product in an
aqueous solution takes place by crystallization.

Develop a process schematic which will yield separate process streams: the 145,000 molecular weight monoclonal antibody purified and in an aqueous solution; an aqueous solution of the small molecular weight (300 dalton) product  in reasonably purified form; the coloring contaminant in a hot aqueous solution. Your process schematic ultimately must lead to crystals of the small molecular weight product.  Add  comments to justify your selection of the components of the process schematic.

Part II: Preliminary Design Calculations:

(1) You have to find out how much filter press area is needed to process the fermentation broth at the rate at which it is being produced. You have to account for an amount of filter press downtime equal to the production time per 1500 liter for cleaning purposes.

Given:  Information on the fermentation broth properties, filter press operation and the filter cake properties: The fermentation broth has 2.4 % solids (~24.1 kg/m3) and a viscosity of ~2.25 cp at 25°C. The filter medium resistance may be neglected vis-à-vis the cake resistance. The cake may be assumed to be incompressible. The value of μ α Cs for the cake filtration process is 4.75 x 106 kN-sec/m4. The filtrate viscosity may be assumed to be that of water. The filtration operation is carried out at 25°C. The applied pressure difference is 425 kN/m2.
 
(2) For the given concentrations of the monoclonal antibody, the small molecular weight  product and the coloring contaminant in the filtrate, develop a mass balance for a continuous diafiltration step and indicate the volumetric flow rates and concentrations of different species in the different streams obtained.  Determine the membrane area needed.

Given: Membrane properties and mass transfer information: Diafiltration: MWCO of the membrane – 50,000; R300 = 0; Rcoloring matter = 0; RmAb = 0.98; the diafiltration process may be assumed to be such that the protein mass transfer coefficient is 2.5 x 10-5cm/sec throughout diafiltration step; gel polarization with complete protein rejection may be assumed for flux calculation even though it is avoided in diafiltration: also (Cigel/Cilb) = 10. Assume negligible loss of products in the filter press.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9488

Have any Question? 


Related Questions in Computer Engineering

In ssltls protocol what kind of authentication is supported

In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server? A) Only server authentication (optional). B) Server authentication (mandatory) and client a ...

Using a risk assessment and business impact analysiswrite a

Using a risk assessment and business impact analysis. Write a draft memo to the president of the university explaining the need for a business continuity plan. Be sure to include your recommendations on how you would imp ...

In the sandpile model try coloring each patch based on how

In the Sandpile model, try coloring each patch based on how big the avalanche would be if you dropped another grain on it. To do this, make use of the push-n and pop-n procedures so that you can get back to the distribut ...

In this problem we will studylfsrs in somewhat more detail

In this problem we will study LFSRs in somewhat more detail. LFSRs come in three flavors: LFSRs which generate a maximum-length sequence. These LFSRs are based on primitive polynomials. LFSRs which do not generate a maxi ...

1 what is the typical relationship among the untrusted

1. What is the typical relationship among the untrusted network, the firewall, and the trusted network? 2. What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types o ...

Wvcc has decided to purchase a standalone firewall reread

WVCC has decided to purchase a standalone firewall. Reread the "Improved Performance and Security for the Edge of the Network" section of the chapter to understand WVCC's requirements for the firewall. Do some Internet r ...

You are developing a storage system for a application that

You are developing a storage system for a application that demands unusually high reliability, so you have decided to use a three-replica durable storage scheme. You plan to use three ordinary disk drives D1, D2, and D3, ...

1 what is information extortion describe how such an attack

1. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. 2. Why do employees constitute one of the greatest threats to information security? 3. What measures ...

Dta interpretation research reportyour task write a

Data Interpretation Research Report Your task: Write a report on the statistical relationship that you find between the stock price of the company that you have been assigned and the following three variables: the FTSE, ...

1 implement a loop that prompts a user to enter a number

1. Implement a loop that prompts a user to enter a number between 1 and 10, giving three tries to get it right 2. Sometimes students write programs with instructions such as "Enter data, 0 to quit" and that exit the data ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro