Coffee is the most essential drink today, aside from water, the high consumption of coffee and the byproducts of its soluble industries such as spent coffee grounds can have a negative effect on the environment as a source of toxic organic compounds. Therefore, caffeine removal from the spent coffee ground can be applied as a method to limit the effect of its production on the environment. The aim of this study is to determine the kinetics and thermodynamics parameters and develop models for both processes based on the process parameters by using traditional solid-liquid extraction and Ultrasound-assisted extraction methods. The processes were performed at a temperature range of 25 to 55 °C for traditional and ultrasound baths, and experimental time ranged from 5- 60 min. The results demonstrated that under the above conditions, the extraction process applies to the pseudo-first-order reaction, where the rate constant K value increases with temperature. The transition state parameters were also discussed where these parameters indicated that the system of the process exhibited an activated complex formation state resulting in a thermodynamically unfavorable process, and the thermodynamic parameters at the equilibrium state were also evaluated in terms of the obtained yield percentage. The results also showed that the ultrasound-assisted bath process showed a spontaneous behavior at temperatures of 45 °C and 55 °C with D°G of -1192.9703 and - 2725.25 J/mole. On the other hand, for the traditional method, the extraction process was approaching a spontaneous behavior with the temperature increasing where at 25 °C the D°G value was 10379.944 J and at a temperature of 55 °C it reached 8004.26 J/mole.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
The purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration,
Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study wh
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreThe inhibitive effect of imidazol on the dissolution of Zn in (1M) HCl has been studied. The inhibion effect of imidazol ,protection efficiency and the corrosion rate of Zn in (1M) HCl were investigated at various concentrations (1x 10-3 – 5x10-3) M and tempearture range (285-328) K. The corrosion inhibitive of Zn by imidazol was studied using weight loss measurement and analytical titration of the amounts of dissolved zinc in acidic solution in presence and absent of imidazol. It was observed that imidazol led to protection efficiency reached to (88.93)% when (10)mM imidazol concentration was used. A linear relationship came true between (C/?) and (C); where (?) is the coverage of Zn surface by imidazol which could be obtained from
... Show MoreWhen laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio
