Preferred Language
Articles
/
alkej-190
Prediction of Reaction Kinetic of Al- Doura Heavy Naphtha Reforming Process Using Genetic Algorithm
...Show More Authors

In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad.  One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.

The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and activation energies were determined after fine tuning of the model results with experimental data. The input to the optimization is the compositions for 21 components and the temperature for the effluent stream for each one of the four reactors within the reforming process while the output of optimization is 142 predicted kinetic parameters for 71 reactions within reforming process.  The differential optimization technique using genetic algorithm to predict the parameters of the kinetic model.

To validate the kinetic model, the simulation results of the model based on proposed kinetic model was compared with the experimental results. The comparison between the predicted and commercially results shows a good agreement, while the percentage of absolute error for aromatics compositions are (7.5, 2, 8.3, and 6.1%) and the temperature absolute percentage error are (0.49, 0.5, 0.01, and 0.3%) for four reactors respectively.   

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The semantics of terms in terms of inclusiveness when Imam Ibn Hajar al-Askalani (d. 852 e) in his book Fath al-Bari: Door of worship - Practical models
...Show More Authors

Praise be to Allaah.
My research has included the following: The field of application of semantics when fundamentalists are the book and the Sunnah. Imam Ibn Hajar agreed with the majority of fundamentalists that what is meant from the year (one word denotes one side on two things onwards), and agreed that the significance of the year specific to the rest of its members is not a definite and definite formulas of the public has the singular known as (the) Astragharism, and the plural known as ( The nationality stating that dumping, pluralism is defined as (add), and nakra, if it occurs in the context of the condition, denial and prohibition, the names of the condition, the connected names, and the word (all - all). And the year in whic

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Use Of Computerized Curriculum Individually and Cooperatively In the Achievement of Ninth Grade Students in Mathematics
...Show More Authors

The study aimed to investigate the effect of using the intructional computer individually or through the cooperative groups on the achievement of the ninth grade students in mathematics compared to the traditional method. The experimental method adapted three groups out of three schools were chosen, two groups of the students where applied the computer method. The comtrol group used the simple random method, and it used the diagnostic test as tool for the study.The result showed that there is a statistically significant difference between the mean scores of the experimental groups and the control group on the post-test for the two experimental groups.

View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Energies
Well Placement Optimization through the Triple-Completion Gas and Downhole Water Sink-Assisted Gravity Drainage (TC-GDWS-AGD) EOR Process
...Show More Authors

Gas and downhole water sink-assisted gravity drainage (GDWS-AGD) is a new process of enhanced oil recovery (EOR) in oil reservoirs underlain by large bottom aquifers. The process is capital intensive as it requires the construction of dual-completed wells for oil production and water drainage and additional multiple vertical gas-injection wells. The costs could be substantially reduced by eliminating the gas-injection wells and using triple-completed multi-functional wells. These wells are dubbed triple-completion-GDWS-AGD (TC-GDWS-AGD). In this work, we design and optimize the TC-GDWS-AGD oil recovery process in a fictitious oil reservoir (Punq-S3) that emulates a real North Sea oil field. The design aims at maximum oil recovery us

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Vostok. Afro-aziatskie Obshchestva: Istoriia I Sovremennost
The carrier of word-formation meaning in russian and arabic gramatic traditions: the word model in the russian-arabic translation algorithm
...Show More Authors

The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي
...Show More Authors

استخدام الضمائر انت وانتم في الآدب الروسي الكلاسيكي

View Publication Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أثر استخدام التوقيع الرقمي في العمليات المصرفية الالكترونية
...Show More Authors

The purpose of this research is to identify the E-signing and its concept.

Due to the increasing role and importance of the E-trade in may countries, as it provide many advantages over the traditional trade. We have to deal with may E-trade aspects and tools in which the E-signing is the most important. In this research we will deal: first with the article approach- E-signing definition, Digital signing, its mechanism, requirements, types and features. Second: the practical approach: It has been implemented according to a questionnaire contain many questions some of them are comma, other an specialized in research hypothesis and some concern the obstacles faced the application of E-signing. The questionnaires been distillated to

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
استخدام أساليب ألامثلية لحل مشكلة النقل (دراسة تطبيقية )
...Show More Authors

Transportation problems are considered as a type of operation research problems. In fact, they deal with scheduling transportation of goods from their source to delivery sites in the minimum cost.

Such problems can be solved by the available traditional methods, which include; North-West corner, Least cost and Vogel’s method. As well as if this transportation problem is considered as a linear program it can also be solved by using Simplex method

The goal of the present study is to compare different research methods to provide the optimal and minimum cost.

This study was applied to resolve a transportation problem related to land Transportation Company, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تشخيص عوامل النجاح الحرجة لتفعيل استخدام الحاسوب الشخصي
...Show More Authors

تشخيص عوامل النجاح الحرجة لتفعيل استخدام الحاسوب الشخصي

View Publication Preview PDF
Crossref