Preferred Language
Articles
/
alkej-627
Correlation for fitting multicomponent vapor-liquid equilibria data and prediction of azeotropic behavior
...Show More Authors

Correlation equations for expressing the boiling temperature as direct function of liquid composition have been tested successfully and applied for predicting azeotropic behavior of multicomponent mixtures and the kind of azeotrope (minimum, maximum and saddle type) using modified correlation of Gibbs-Konovalov theorem. Also, the binary and ternary azeotropic point have been detected experimentally using graphical determination on the basis of experimental binary and ternary vapor-liquid equilibrium data.

            In this study, isobaric vapor-liquid equilibrium for two ternary systems: “1-Propanol – Hexane – Benzene” and its binaries “1-Propanol – Hexane, Hexane – Benzene and 1-Propanol – Benzene” and the other ternary system is “Toluene – Cyclohexane – iso-Octane (2,2,4-Trimethyl-Pentane)” and its binaries “Toluene – Cyclohexane, Cyclohexane – iso-Octane and Toluene – iso-Octane” have been measured at 101.325 KPa. The measurements were made in recirculating equilibrium still with circulation of both the vapor and liquid phases. The ternary system “1-Propanol – Hexane – Benzene” which contains polar compound (1-Propanol) and the two binary systems “1-Propanol – Hexane and 1-Propanol – Benzene” form a minimum azeotrope, the other ternary system and the other binary systems do not form azeotrope.

            All the data passed successfully the test for thermodynamic consistency using McDermott-Ellis test method (McDermott and Ellis, 1965).

            The maximum likelihood principle is developed for the determination of correlations parameters from binary and ternary vapor-liquid experimental data which provides a mathematical and computational guarantee of global optimality in parameters estimation for the case where all the measured variables are subject to errors and the non ideality of both vapor and liquid phases for the experimental data for the ternary and binary systems have been accounted.

            The agreement between prediction and experimental data is good. The exact value should be determined experimentally by exploring the concentration region indicated by the computed values.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 24 2020
Journal Name
Basic Education College Magazine For Educational And Humanities Sciences
The healthy behavior of the Arab citizen in light of the Corona crisis 2020-6-24
...Show More Authors

Abstract: The world witnessed the speed of a dangereuse virus now as Corona or Covid 19, which left many deaths in light of the inability of local and international Heath agencies to find a suitable vaccine to eliminate it and limit its spread, which negatively affected humain life in its various fields, and remains adopting healthy behaviors and habits A healthy Heath is the best solution to face the spread of the epidemic until realistic solutions that eliminate the virus are found.

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Effect of the shot peening surface treatment on the corrosion behavior of 2024-T3 aluminum alloy
...Show More Authors

Preview PDF
Scopus (2)
Scopus
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Jan 19 2021
Journal Name
Isprs International Journal Of Geo-information
The Potential of LiDAR and UAV-Photogrammetric Data Analysis to Interpret Archaeological Sites: A Case Study of Chun Castle in South-West England
...Show More Authors

With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored

... Show More
View Publication
Scopus (26)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed May 06 2020
Journal Name
كلية التربية البدنية وعلوم الرياضة/جامعة بغداد
Disability Scale and Its Relationship With Cognitive Behavior On Some Basic Skills, Offensive Tactical Performance In Youth Soccer Players
...Show More Authors

MO Khudhair, 2020

View Publication
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application
...Show More Authors

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Smoking Behavior Among School Students At Al-Doura/Al- Kurkh/Baghdad Year 2014
...Show More Authors

Background: Most adult smokers start smoking regularly some time before 18 years of age. Cigarette smoking is a major ‘preventable’ cause of morbidity and mortality worldwide. It is well-known that smoking has hazardous effect on many systems like pulmonary and cardiovascular system.

Objectives: Study the prevalence of smoking among school pupils according to the mode of smoking, age, school grade, school environment and possible health risk associated with smoking. Type of the study: A cross-sectional study.

Methods: Study was conducted between 1st of March 2014 to 30th of May 2014 at Al-Doura/Al- Kurkh/Baghdad by using convenient sample, including all pupils from 6 schools. The schools were 2 secondary schools, 3 in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Effect of laser process an inclined surface cutting of mild steel then analysis data statistically by RSM
...Show More Authors

The regression analysis process is used to study and predicate the surface response by using the design of experiment (DOE) as well as roughness calculation through developing a mathematical model. In this study; response surface methodology and the particular solution technique are used. Design of experiment used a series of the structured statistical analytic approach to investigate the relationship between some parameters and their responses. Surface roughness is one of the important parameters which play an important role. Also, its found that the cutting speed can result in small effects on surface roughness. This work is focusing on all considerations to make interaction between the parameters (position of influenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref