The increasing demand for energy has encouraged the development of renewable resources and environmentally benign fuel such as biodiesel. In this study, ethyl fatty esters (EFEs), a major component of biodiesel fuel, were synthesized from soybean oil using sodium ethoxide as a catalyst. By-products were glycerol and difatty acyl urea (DFAU), which has biological characteristics, as antibiotics and antifungal medications. Both EFEs and DFAU have been characterized using Fourier transform infrared (FTIR) spectroscopy, and 1H nuclear magnetic resonance (NMR) technique. The optimum conditions were studied as a function of reaction time, reactant molar ratios, catalyst percentage and the effect of organic solvents. The conversion ratio of soybean oil into pure EFEs was 76% after 10 h of reaction. The highest conversion yield of EFEs is obtained when the urea/soybean oil ratio was from 6.2 mmol to 1 mmol, while the highest production of DFAU is obtained when the ethoxide (as a catalyst)/soybean oil ratio is from 6.4 mmol to 1 mmol in hexane as the reaction medium.
The current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show Moreunacceptable social behaviors, particularly withdrawal behavior that appears in children with autism represent a major problem hindering the process of communication with those around them and therefore the process of mergence with them be difficult.
The withdrawal causes a real affect deficit for children with autism limits the possibility of development of their intellectual and mental growth due to their solitude and the weakness of their focus in the acquisition of pedagogical skills and lack the necessary social skills to maintain the relations of friendship and enjoyment of them.
withdrawal children fail to participate
... Show MoreThe formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref
... Show More