In the present work experiments were conducted to study the effect of solid loading (1,5 and 9 vol.%) on the enhancement of carbon dioxide absorption in bubble column at various volumetric gas flow rate (0.75, 1 and 1.5 m3/h) and absorbent concentration (caustic soda)( 0.1,0.5 and 1 M ). Activated carbon and alumina oxide (Al2O3) are used as solid particles. The Danckwerts method was used to calculate interfacial area and individual mass transfer coefficients during absorption of carbon dioxide in a bubble column. The results show that the absorption rate was increased with increasing volumetric gas flow rate, caustic soda concentration and solid loading. Mass transfer coefficient and interfacial area were increased with increasing volumetric gas flow rate, and solid loading.
New Schiff base [3-(3-acetylthioureido)pyrazine-2-carboxylic acid][L] has been prepared through 2 stages, the chloro acetyl chloride has been reacting with the ammonium thiocyanate in the initial phase for producing precursor [A], after that [A] has been reacting with the 3-amino pyrazine-2-carboxilic acid to provide a novel bidentate ligand [L], such ligand [L] has been reacting with certain metal ions in the Mn(II), VO(II), Ni(II), Co(II), Zn(II), Cu(II), Hg(II), and Cd(II) for providing series of new metal complexes regarding general molecular formula [M(L)2XY], in which; VO(II); X=SO4,Y=0, Co(II), Mn(II), Cu(II), Ni(II), Cd(II), Zn(II), and Hg(II); Y=Cl, X=Cl. Also, all the compounds were characterized through spectroscopic techniques [
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreThe study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreAnastrozole (ANZ) is considered constitute of the fourth –generation of Non–steroidal aromatase blockage, ANZ has use for hormone receptor positive breast cancer in postmenopausal women. The serious side effects of ANZ including, vaginal dryness, hot flashes, irritability, breast tenderness and un–stability in circulation.
Nanostructured lipid carriers (NLCs) have recently emerged as a multifunctional platform for drug delivery in cancer therapy.
Five formula were composed of (200 mg of glyceryl monostearate, 40 mg of oleic acid , 1% (w/w) Tween 80, 1% (w/w) Poloxamer 407, 1% (w/w) soy lecithin and Vitamin E Polyethylene Glycol Succinate.
The mean particle size, polydispersity index, zeta potential, entrapme
... Show MoreThe reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal
... Show MoreThe preparation and spectral characterization of complexes for Co(II), Ni(II), Cu(II), Cd(II), Zn(II) and Hg(II) ions with new organic heterocyclic azo imidazole dye as ligand 2-[(2`-cyano phenyl) azo ]-4,5-diphenyl imidazole ) (2-CyBAI) were prepared by reacting a dizonium salt solution of 2-cyano aniline with 4,5-diphenyl imidazole in alkaline ethanolic solution .These complexes were characterized spectroscopically by infrared and electronic spectra along with elemental analysis‚ molar conductance and magnetic susceptibility measurements. The data show that the ligand behaves a bidantate and coordinates to the metal ion via nitrogen atom of azo and with imidazole N3 atom. Octahedral environment is suggested for all metal complex
... Show Moreالمستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near topological spaces over B. Also, we introduce the concepts of fibrewise near closed and near open topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More