Preferred Language
Articles
/
alkej-627
Correlation for fitting multicomponent vapor-liquid equilibria data and prediction of azeotropic behavior
...Show More Authors

Correlation equations for expressing the boiling temperature as direct function of liquid composition have been tested successfully and applied for predicting azeotropic behavior of multicomponent mixtures and the kind of azeotrope (minimum, maximum and saddle type) using modified correlation of Gibbs-Konovalov theorem. Also, the binary and ternary azeotropic point have been detected experimentally using graphical determination on the basis of experimental binary and ternary vapor-liquid equilibrium data.

            In this study, isobaric vapor-liquid equilibrium for two ternary systems: “1-Propanol – Hexane – Benzene” and its binaries “1-Propanol – Hexane, Hexane – Benzene and 1-Propanol – Benzene” and the other ternary system is “Toluene – Cyclohexane – iso-Octane (2,2,4-Trimethyl-Pentane)” and its binaries “Toluene – Cyclohexane, Cyclohexane – iso-Octane and Toluene – iso-Octane” have been measured at 101.325 KPa. The measurements were made in recirculating equilibrium still with circulation of both the vapor and liquid phases. The ternary system “1-Propanol – Hexane – Benzene” which contains polar compound (1-Propanol) and the two binary systems “1-Propanol – Hexane and 1-Propanol – Benzene” form a minimum azeotrope, the other ternary system and the other binary systems do not form azeotrope.

            All the data passed successfully the test for thermodynamic consistency using McDermott-Ellis test method (McDermott and Ellis, 1965).

            The maximum likelihood principle is developed for the determination of correlations parameters from binary and ternary vapor-liquid experimental data which provides a mathematical and computational guarantee of global optimality in parameters estimation for the case where all the measured variables are subject to errors and the non ideality of both vapor and liquid phases for the experimental data for the ternary and binary systems have been accounted.

            The agreement between prediction and experimental data is good. The exact value should be determined experimentally by exploring the concentration region indicated by the computed values.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization and Investigation Liquid Crystalline, Properties of 1, 2, 3-triazole Derivatives via Cycloaddition Reaction
...Show More Authors

The new of compounds synthesized by sequence reactions starting from a reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride to produce the compounds [I]a,b, then the compounds[I]a,b reacted with sodium azide to yield compounds[II]a,b that reacted 1,3-dipolarcycloaddition reaction with acrylic acid to give compounds [III]a,b these compounds reacted with methanol led to ester compounds[IV]a,b then reacted with hydrazine to give acid hydrazide [V]a,b . Finally compounds [V]a,b reacted with aromatic aldehydes to product shiff bases derivatives. The compounds characterized by mp. , IR, 1HNMR in addition to mass spectroscopy for some of them the liquid crystals properties were studied by using polarized optical microsco

... Show More
Scopus (2)
Scopus
Publication Date
Sun Dec 25 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Epicatechin product of Camellia sinensis leaves detection by thin layer chromatography and high performance liquid chromatography
...Show More Authors

The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

View Publication
Scopus (93)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Mon Mar 31 2025
Journal Name
The Iraqi Geological Journal
Evaluation of Machine Learning Techniques for Missing Well Log Data in Buzurgan Oil Field: A Case Study
...Show More Authors

The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Estimating the Parameters of Exponential-Rayleigh Distribution for Progressively Censoring Data with S- Function about COVID-19
...Show More Authors

The two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
SDN-RA: An Optimized Reschedule Algorithm of SDN Load Balancer for Data Center Networks Based on QoS
...Show More Authors
Abstract<p>With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
تعيين عنصر الزئبق السام بتراكيز نزرة في نماذج غذائية ومائية مختلفة باستخدام منظومة بخار الزئبق البارد المرتبطة مع جهاز الامتصاص الذري اللهبي
...Show More Authors

الخلاصة

     يتضمن البحث تعيين عنصر الزئبق السام بتراكيزنزرة عالية الدقة (نانوغرام) باستخدام منظومة يخار الزئبق البارد لنماذج غذائية (لحوم حمراء ، لحوم بيضاء ) مختلفة ونماذج مائية (ماء النهر، مياه صناعية ، ماء الشرب) وربط المنظومة بتقنية الامتصاص الذري اللهبي.

     ان عنصر الزئبق من اشد العناصر سمية وان التراكيز المسموح بها عالميا لايتعدى جزء واحد

View Publication Preview PDF
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
Recurrent Neural Networks and its Applications in Time Series Data
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref