In this study, a proposed process for the utilization of hydrogen sulphide separated with other gases from omani natural gas for the production of sulphuric acid by wet sulphuric acid process (WSA) was studied. The processwas simulated at an acid gas feed flow of 5000 m3/hr using Aspen ONE- V7.1-HYSYS software. A sensitivity analysis was conducted to determine the optimum conditions for the operation of plant. This included primarily the threepacked bed reactors connected in series for the production of sulphur trioxidewhich represented the bottleneck of the process. The optimum feed temperature and catalyst bed volume for each reactor were estimated and then used in the simulation of the whole process for two cases namely 4 and 6 mole% SO2 stream fed to the first catalytic reactor. The 4mole% SO2 gaves the highest conversion (98%) compared with 6 mole% SO2 (94.7%). A valuable quantity of heat was generated from the process. This excess heat could also be transformed into power in a turbine or used as a heating media in neighbouring process units.
Abstract:
The great importance that distinguish these factorial experiments made them subject a desirable for use and application in many fields, particularly in the field of agriculture, which is considered the broad area for experimental designs applications.
And the second case for the factorial experiment, which faces researchers have great difficulty in dealing with the case unbalance we mean that frequencies treatments factorial are not equal meaning (that is allocated a number unequal of blocks or units experimental per tre
... Show MoreNon-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreThe basic goal of this research is to utilize an analytical method which is called the Modified Iterative Method in order to gain an approximate analytic solution to the Sine-Gordon equation. The suggested method is the amalgamation of the iterative method and a well-known technique, namely the Adomian decomposition method. A method minimizes the computational size, averts round-off errors, transformation and linearization, or takes some restrictive assumptions. Several examples are chosen to show the importance and effectiveness of the proposed method. In addition, a modified iterative method gives faster and easier solutions than other methods. These solutions are accurate and in agreement with the series
... Show MorePhishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency. This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing websi
... Show MoreKrawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the
... Show MoreVisual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreUltrasound imaging has some problems with image properties output. These affects the specialist decision. Ultrasound noise type is the speckle noise which has a grainy pattern depending on the signal. There are two parts of this study. The first part is the enhancing of images with adaptive Weiner, Lee, Gamma and Frost filters with 3x3, 5x5, and 7x7 sliding windows. The evaluated process was achieved using signal to noise ratio (SNR), peak signal to noise ratio (PSNR), mean square error (MSE), and maximum difference (MD) criteria. The second part consists of simulating noise in a standard image (Lina image) by adding different percentage of speckle noise from 0.01 to 0.06. The supervised classification based minimum di
... Show More