Preferred Language
Articles
/
alkej-190
Prediction of Reaction Kinetic of Al- Doura Heavy Naphtha Reforming Process Using Genetic Algorithm
...Show More Authors

In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad.  One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.

The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and activation energies were determined after fine tuning of the model results with experimental data. The input to the optimization is the compositions for 21 components and the temperature for the effluent stream for each one of the four reactors within the reforming process while the output of optimization is 142 predicted kinetic parameters for 71 reactions within reforming process.  The differential optimization technique using genetic algorithm to predict the parameters of the kinetic model.

To validate the kinetic model, the simulation results of the model based on proposed kinetic model was compared with the experimental results. The comparison between the predicted and commercially results shows a good agreement, while the percentage of absolute error for aromatics compositions are (7.5, 2, 8.3, and 6.1%) and the temperature absolute percentage error are (0.49, 0.5, 0.01, and 0.3%) for four reactors respectively.   

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Global Pharma Technology
Application of H-Point Standard Addition Method in Kinetic- Spectrophotometric Determination of Phenylephrine in Nasal Drops and Tetracycline in Capsule
...Show More Authors

A new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0

... Show More
Publication Date
Sat Feb 01 2020
Journal Name
Egyptian Journal Of Chemistry
Preparation and Characterization of Graphene Oxide – Attapulgite composite and its use in kinetic study of Alizarin Dye Adsorptionfrom Aqueous Media
...Show More Authors

ATTAPULGITE clay was modified in this study by the graphene oxide sheets and the clay was diagnosed before and after modification using several techniques (Fourier-transform infrared spectroscopy FT-IR, X-ray powder diffraction XRD, Scanning electron microscope SEM , energy dispersive spectroscopy EDX ) ,The surface of the attapulgite clay (before (Ata) after modification by graphene oxide (Ata-GO) ) was applied to adsorption of the Alizarin dye from its water solutions through the application of several kinetic models (pseudo first-order model , pseudo second -order model , intraparticle diffusion model ),It was found that the practical results follow pseudo second -order model. The process of modification on the surface of the mud has imp

... Show More
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
AWSS: An Algorithm for Measuring Arabic Word Semantic Similarity
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Optimal Algorithm for Resource Allocation in D2D Communication
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Rightness in Evalating Basra and Kufa’s Views in The Work Of Al _ Anbary, Al - Insaf Fi Masael Al - Khilaf
...Show More Authors

This paper deals with the Kufis and basris agreements in Abo Al _ Barakat Al _ anbary’s
work “ Al- Insaf Fi Masael Al - Khilaf.It attempts to settle the disputes and find out the right
views.
The book presents the issnes that the two schools of Kufa and Basra dispute upon and try to
evaluate them so as to support the correct ones .The present researcher has noticed that the
author of the above work was not always right or accurate in picturing a number of issues as
disputable whereas they implicitly shared the same views .Accordingly ,this papor sheds light
on such cases and drew acadernic researchers, attention to the invalidity of Al –anbary’s
misjudged views.

View Publication Preview PDF