Preferred Language
Articles
/
alkej-177
Simulation of a Wet Sulfuric Acid Process (WSA) for Utilization of Acid Gas Separated from Omani Natural Gas
...Show More Authors

In this study, a proposed process for the utilization of hydrogen sulphide separated with other gases from omani natural gas for the production of sulphuric acid by wet sulphuric acid process (WSA) was studied. The processwas simulated at an acid gas feed flow of   5000 m3/hr using Aspen ONE- V7.1-HYSYS software. A sensitivity analysis was conducted to determine the optimum conditions for the operation of plant. This included primarily the threepacked bed reactors connected in series for the production of sulphur trioxidewhich represented the bottleneck of the process. The optimum feed temperature  and catalyst bed volume for each reactor were estimated and then used in the simulation of the whole process for two cases namely 4 and 6 mole% SO2 stream fed to the first catalytic reactor. The 4mole% SO2 gaves the highest conversion (98%) compared with 6 mole% SO2 (94.7%). A valuable quantity of heat was generated from the process. This excess heat could also be transformed into power in a turbine or used as a heating media in neighbouring process units.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Minerva Dental And Oral Science
Salivary interleukin-1β as a biomarker to differentiate between periodontal health, gingivitis, and periodontitis
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 10 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. S Ci.
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)
...Show More Authors

The aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.

Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
A Note on the Hierarchical Model and Power Prior Distribution in Bayesian Quantile Regression
...Show More Authors

  In this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the  and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The other day in the Holy Quran and the four Gospels: A comparative study
...Show More Authors

The other day in the Holy Quran and the four Gospels

View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
meta and its dimensions in the designed bio-formation - virtual reality environment - a model
...Show More Authors

This study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use the target costing in Decrease costing a practical company far AL-Amal Industries
...Show More Authors

The Target costing is an important modern techniques strategic managerial accounting.which is been shown active adoption to changes in contemporary business environments Inaddition,they had been adopted by the units as aresult of the growth in the strategic approach in the man agement..the goal of using target costing is to build and strengthen competitive abilities of economic units thvough introducing appropriate ways to decrease cost and improving quality of product The hypothesis reflects interest in achieving the goal of the research,ie.research question,The hypothesis use target costing to assist economic units to decrease cost and in the manner that leads to competitive advantages while surviving and flourishing in current busines

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Roadway Deterioration Prediction Using Markov Chain Modeling (Wasit Governorate/ Iraq as a Case Study)
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref