This work deals with kinetics and chemical equilibrium studies of esterification reaction of ethanol with acetic acid. The esterification reaction was catalyzed by an acidic ion exchange resin (Amberlyst- 15) using a batch stirred tank reactor. The pseudo-homogenous and Eley-Rideal models were successfully fitted with experimental data. At first, Eley-Rideal model was examined for heterogeneous esterification of acetic acid and ethanol. The pseudo-homogenous model was investigated with a power-law model. The apparent reaction order was determined to be (0.88) for Ethanol and (0.92) for acetic acid with a correlation coefficient (R2) of 0.981 and 0.988, respectively. The reaction order was determined to be 4.1087x10-3 L0.8/(mol0.8.min) with R2 of 0.954. The adsorption constants of acetic acid and ethanol were calculated as 0.023 and 0.044 L/mol, respectively and the lumped reaction constant were determined to be 5*10-4 L2/gcat.mol.min. The results of the reaction kinetic study show that the high acetic acid/ethanol molar ratio was favored. The maximum conversion of 70 % was obtained at 70°C for acetic acid/ethanol molar ratio of 4.
This study presents a rapid, sensitive, and straightforward approach to measure chlorpheniramine maleate (CPM) by using turbidity CFIA. The method involves CPM reacting with sodium nitroprusside (Nitropress) to produce a pale white precipitate. The NAG-SSP-5S1D analyzer was used to measure turbidity at 0°–180° angle to detect the attenuation of incident light as a result of collision on the surfaces of the precipitate particles. The linear range of CPM measurements was between 0.008 and 11 m.mol/L, with correlation coefficient of 0.9983 and R2% = 99.65. The limit of detection was determined to be 0.0328 µg/sample from the lowest concentration in the calibration curve, and the repeatability of the method (RSD%) was less than 0.4% (n = 6
... Show MoreIn this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MorePorous silicon (PS) layers are prepared by anodization for
different etching current densities. The samples are then
characterized the nanocrystalline porous silicon layer by X-Ray
Diffraction (XRD), Atomic Force Microscopy (AFM), Fourier
Transform Infrared (FTIR). PS layers were formed on n-type Si
wafer. Anodized electrically with a 20, 30, 40, 50 and 60 mA/cm2
current density for fixed 10 min etching times. XRD confirms the
formation of porous silicon, the crystal size is reduced toward
nanometric scale of the face centered cubic structure, and peak
becomes a broader with increasing the current density. The AFM
investigation shows the sponge like structure of PS at the lower
current density porous begi
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreBackground: Tumors of the oral cavity are under
estimated in general dental and medical practice,
some authors describe it as the forgetting disease,
others wondering if the attention paid to this disease
compared to its fatality (The 5-year survival rate is
about 50%) is enough for disease control? However;
this disease deserves a comprehensive assessment by
all dental and medical fields assumed to examine the
oral cavity regularly, especially otolaryngologist.
Objectives: To find out the sensitivity and specificity
of clinical examination in diagnosing oral tumors and
premalignant conditions by otolaryngologist.
Methods: Across sectional retrospective study was
conducted in the:
-study design: