Introduction: Although soap industry is known from hundreds of years, the development accompanied with this industry was little. The development implied the mechanical equipment and the additive materials necessary to produce soap with the best specifications of shape, physical and chemical properties. Objectives: This research studies the use of vacuum reactive distillation VRD technique for soap production. Methods: Olein and Palmitin in the ratio of 3 to 1 were mixed in a flask with NaOH solution in stoichiometric amount under different vacuum pressures from -0.35 to -0.5 bar. Total conversion was reached by using the VRD technique. The soap produced by the VRD method was compared with soap prepared by the reaction - only method which is known as the conventional method. The two kinds of soap were compared in yield, the reaction temperature, the volume of the co-product liquid and its composition, FTIR analysis, the density and the time of production. Results: It was shown that the yield of soap using VRD was 2.45 times that produced by the reaction - only method. The process temperature was reduced 0.11 times. The volume of the co-product liquid was reduced 95.76% consisting of water only. The analyses of FTIR were compared with a commercial soap regarded as a standard and they showed identical functional groups. Very little difference in density was recorded. The time of production was shorter than the conventional method giving another priority to the VRD method. Conclusion: It was beneficial to adopt VRD method in soap production in batch mode. Continuous mode of soap production using VRD method may be investigated in future study.
The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreThe Hartha Formation (age Late Campanian – Early Maastrichtian) is considered an important oil reservoir in Iraq. The petrography and the diagenetic features were determined based on the analyses of 430 thin sections from selected wells within Balad and East Baghdad oil fields, Ba-2, Ba-3, EB-53, Eb-56 and EB-102.
The most important and common diagenesis processes that affect Hartha Formation include Cementation, Neomorphsim, Micrtitization, Dolomitization, Compaction, Dissolution, and Authigenic minerals. This diagenesis deformation on Hartha Formation has overall accentuated the reservoir quality heterogeneity.
The reservoir quality evolution is affected by destruction by grain compaction mechanical and chemica
... Show MoreField trial was conducted during the growing season of 2011-2012 at the Research
Field, Department of Biology, College of Science, Baghdad University to test the
performance of wheat cv Rabyaa, Latifiya, Al-Iraq, Tummose 2, Abu-Graib 3, IPA
99 and Sham 6 grown under different soil water deficit stresses. Several agronomic
and physiological traits and yield and yield components of the test cultivars were
determined. The experiment was conducted in split plot design with five replications
for each treatment. The cultivars were kept in the sub plot while water stress
treatment was assigned as main plot. Water stress was applied by irrigated the plots
to the soil field capacity (FC) then withheld next irrigation until
The current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to en
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Empirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreThe preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.
The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.
Sixteenth formulae of SPH h
... Show MoreIn this study, out of 50 isolates of some nosocomial infections from some Baghdad hospitals, only 13 (26%) were identified as Escherichia coli. Depending on selective media, morphological and biochemical tests the species was then confirmed by molecular methods. Later on antimicrobial resistance test was performed by the Kirby-Bauer method. The molecular characterization of blaTEM and blaCTX-M genes in different clinical isolates of E. coli was done through polymerase chain reaction (PCR) by utilizing special primers. These genes were positive to only 4 (30.7%) isolates. The sequence of nucleotides of positive genes was carried out for four isolates. The results showed that there was no vari
... Show MoreThe article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show More