In the present work, leaching process studiedusing organic acids (acetic acid and lactic acid) to extract phosphate from the Iraqi Akashat phosphate ore by separation of calcareous materials (mainly calcite). This approach characterized by energy conservation, environmental enhancement by recovery of calcite as calcium sulfate (gypsum), keeping the physical and chemical properties of apatite. Samples were analyzed using X-ray diffraction and FTIR spectrophotometer. From the obtained experimental data it was found that using the two organic acids yields closed purity values of the produced apatite at the optimum conditions, while at different acid concentrations, it was found that the efficiency of acetic acid is higher at the low acid co
... Show MoreIn this study, a proposed process for the utilization of hydrogen sulphide separated with other gases from omani natural gas for the production of sulphuric acid by wet sulphuric acid process (WSA) was studied. The processwas simulated at an acid gas feed flow of 5000 m3/hr using Aspen ONE- V7.1-HYSYS software. A sensitivity analysis was conducted to determine the optimum conditions for the operation of plant. This included primarily the threepacked bed reactors connected in series for the production of sulphur trioxidewhich represented the bottleneck of the process. The optimum feed temperature and catalyst bed volume for each reactor were estimated and then used in the simulation of the whole process for tw
... Show MoreThe increasing use of polymeric materials in the daily life, leads to challenges in the processing industry to deliver high performance materials with affordable terms. However, new processing techniques lead to high costs. In order to reduce processing costs it is necessary to understand the non-Newtonian behavior of the polymers in their molten state to be able to simulate the processes before the construction of the plants starts. Here the shear thinning behavior of the viscosity of polymeric melts is essential. Thus, this paper deals with the experimental investigation of the thermo-rheological behavior of the viscosity of one of the most used polymers (Polypropylene) over a wide range of temperatures and shear rates. Furthermo
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
Objectives Dental implant is a revolution in dentistry; some shortages are still a focus of research. This study use long duration of radiofrequency (RF)–magnetron sputtering to coat titanium (Ti) implant with hydroxyapatite (HA) to obtain a uniform, strongly adhered in a few micrometers in thickness. Materials and Methods Two types of substrates, discs and root form cylinders were prepared using a grade 1 commercially pure (CP) Ti rod. A RF–magnetron sputtering device was used to coat specimens with HA. Magnetron sputtering was set at 150 W for 22 hours at 100°C under continuous argon gas flow and substrate rotation at 10 rpm. Coat properties were evaluated via field emission scanning electron microscopy (FESEM), scanning electro
... Show More