Preferred Language
Articles
/
alkej-627
Correlation for fitting multicomponent vapor-liquid equilibria data and prediction of azeotropic behavior
...Show More Authors

Correlation equations for expressing the boiling temperature as direct function of liquid composition have been tested successfully and applied for predicting azeotropic behavior of multicomponent mixtures and the kind of azeotrope (minimum, maximum and saddle type) using modified correlation of Gibbs-Konovalov theorem. Also, the binary and ternary azeotropic point have been detected experimentally using graphical determination on the basis of experimental binary and ternary vapor-liquid equilibrium data.

            In this study, isobaric vapor-liquid equilibrium for two ternary systems: “1-Propanol – Hexane – Benzene” and its binaries “1-Propanol – Hexane, Hexane – Benzene and 1-Propanol – Benzene” and the other ternary system is “Toluene – Cyclohexane – iso-Octane (2,2,4-Trimethyl-Pentane)” and its binaries “Toluene – Cyclohexane, Cyclohexane – iso-Octane and Toluene – iso-Octane” have been measured at 101.325 KPa. The measurements were made in recirculating equilibrium still with circulation of both the vapor and liquid phases. The ternary system “1-Propanol – Hexane – Benzene” which contains polar compound (1-Propanol) and the two binary systems “1-Propanol – Hexane and 1-Propanol – Benzene” form a minimum azeotrope, the other ternary system and the other binary systems do not form azeotrope.

            All the data passed successfully the test for thermodynamic consistency using McDermott-Ellis test method (McDermott and Ellis, 1965).

            The maximum likelihood principle is developed for the determination of correlations parameters from binary and ternary vapor-liquid experimental data which provides a mathematical and computational guarantee of global optimality in parameters estimation for the case where all the measured variables are subject to errors and the non ideality of both vapor and liquid phases for the experimental data for the ternary and binary systems have been accounted.

            The agreement between prediction and experimental data is good. The exact value should be determined experimentally by exploring the concentration region indicated by the computed values.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 24 2019
Journal Name
Journal Of Engineering
Effect of Use Recycled Coarse Aggregate on the Behavior of Axially Loaded Reinforced Concrete Columns
...Show More Authors

Nowadays, the use of recycled waste construction materials instead of aggregates is becoming popular in construction owing to its environmental benefits. This paper presents an experimental and analytical campaign to study the behavior of axially loaded columns constructed from recycled aggregates. The latter was used instead of natural aggregates, and they were collected from the waste of previous concrete constructions. Different concrete mixtures made from varying amounts of recycled aggregates ranged from 0 to 50% of the total coarse aggregate were conducted to achieve 28 MPa. The effect of steel fibers is another investigated variable with volumes ranged from 0 to 2% concerning concrete’s mixture. The experimental

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
EFFECT OF STEEL FIBERS ADDITION ON THE BEHAVIOR OF HIGH STRENGTH CONCRETE CIRCULAR SHORT COLUMNS
...Show More Authors

loaded reinforced concrete circular short columns. An experimental investigation into the behavior
of 24 short reinforced concrete columns with and without steel fibers was carried out. The columns
had a circular section (200 mm diameter and 900 mm long). Test variables include concrete
strength, spacing of spiral reinforcement, and inclusion of steel fibers. The axial stress and axial
strains were obtained and used to evaluate the effects of the presence of steel fibers. It was found
that the addition of steel fibers slightly improves the load carrying capacity of the tested columns
whereas it significantly enhances the ductility of these specimens. Test results also indicated that for
the same confinement parameter

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Non-Linear Behavior of Strengthened Steel-Concrete Composite Beams with Partial Interaction of Shear Connectors
...Show More Authors

In this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Numerical Investigation of the Flexure Behavior of Reinforced Concrete Spandrel Beams with Distributed Tension Reinforcement
...Show More Authors

When the flange of a reinforced concrete spandrel beam is in tension, current design codes and specifications enable a portion of the bonded flexure tension reinforcement to be distributed over an effective flange width. The flexural behavior of the RC L-shaped spandrel beam when reinforcement is laterally displaced in the tension flange is investigated experimentally and numerically in this work. Numerical analysis utilizing the finite element method is performed on discretized flanged beam models validated using experimentally verified L-shaped beam specimens to achieve study objectives. A parametric study was carried out to evaluate the influence of various factors on the beam’s flexure behavior. Results showed that

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 21 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
The Impact of Social Support on Students’ Behavior in the Context of Iraqi Medical Education
...Show More Authors

BACKGROUND: Mental health problems are reflected and linked to human behavior in many aspects. Medical students are susceptible to a wide variety of events that compromise their mental well-being, social life as well as their academic achievements. AIM: This study aimed to find the impact of social support on medical students’ behavior in Iraq via assessing their depression, anxiety, and stress status. METHODS: A cross-sectional online survey-based study targeted all medical students in Iraq. The employed questionnaires covered mental health status of participants by evaluating their perceptions of depression, anxiety, and stress using. Data were analyzed using the Statistical Analysis System. RESULTS: The study revealed a signifi

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Analytical Study of the Royal-Jelly Effect on Sperms Morphological Characteristics and some Liver Function Parameters and their Correlation with some Antioxidants in Male Albino Rats Treated with Pregabalin Drug
...Show More Authors
Abstract<p>In recent years, the consideration of natural products as anti-inflammatory and antioxidative treatments has more interested worldwide. Moreover, natural products are easily obtained and are relatively safe the Royal jelly (RJ) is one of them. The current study was carried to evaluate the effects of pregabalin (PGB) on physiological activity of sperms, reproductive hormones assay and some biochemical analysis. Forty (40) male albino rats (10-weeks-old) were divided into four groups (10 rats each): G1 (treated with PGB drug, 150 mg/kg B.wt (Lyrica-Pfizer-Pharmaceutical Industries), G2 (treated with RJ 1g/kg), G3 (treated with PGB drug and RJ together), and G4 control treated with norma</p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 19 2021
Journal Name
Isprs International Journal Of Geo-information
The Potential of LiDAR and UAV-Photogrammetric Data Analysis to Interpret Archaeological Sites: A Case Study of Chun Castle in South-West England
...Show More Authors

With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored

... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref