Preferred Language
Articles
/
bsj-2656
Improvement of Gasoline Octane Number by Using Organic Compounds
...Show More Authors

The toxic lead additives to gasoline are no longer used in many countries around the world. Many other countries are now phasing out the lead in gasoline. Although the lead fuel is still in use in Iraq, several plans are considered to phase out the lead. The use of organic compounds to replace the lead additives in gasoline is considered now as an option in Iraqi refineries. The main objective of this project was preparation of premium gasoline, by blending of gasoline with Alternative additives (alcohol, aromatic) to enhancing octane number of Al-Doura gasoline pool. Improved gasoline was tested by ASTM standard method which includes octane number measuring by CFR engine analyzer. Gasoline pool RON (80) was used and selective components were added to the gasoline pool (1-3%) to improving it octane, such as ethanol, methanol,isopropanol,isobutanol, benzene, nitrobenzene, Aniline, and nitro aniline. Octane number of blends was measured by CFR engine. Mixture of alternative additives was prepared and adding in 1-3%vol to the gasoline pool. It was found that the additives show significant improvement of octane number of gasoline but the important increasing of RON was shown on use mixture of alcohols and aniline.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 21 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
SIMULTANEOUS ADSORPTION OF TETRACYCLINE AND AMOXICILLIN BY CLADOPHORA AND SPIRULINA ALGAE BIOMASS
...Show More Authors

Adsorption studies were performed at different initial Tetracycline (TC) and Amoxicillin (AMO) concentration, different biomass dosage and type, contact time, agitation speed, and initial pH.  In the batch mode were investigated. The optimum pH of solutions is 6.5 for TC and 5 for AMO, agitation speed 200 rpm and concentration 50 ppm. The results in FTIR showed that there were -OH and amides (N-H) and other functional groups on the surface of Cladophora and Spirulina algae. The equilibrium isotherm data were modeled with Freundlich, Temkin, and Langmuir isotherm models. The data best fitted with the Langmuir model. The maximal adsorption capacity from the Langmuir model was (9.86, 20. 5 mg/g) for TC and (7.89, 17.4 mg/g) for AMO on

... Show More
Crossref (6)
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Biodegradation of Total Petroleum Hydrocarbon from Al-Daura Refinery Wastewater by Rhizobacteria
...Show More Authors

Due to the deliberate disposal of industrial waste, a great amount of petroleum hydrocarbons pollute the soil and aquatic environments. Bioremediation that depends on the microorganisms in the removal of pollutants is more efficient and cost-effective technology. In this study, five rhizobacteria were isolated from Phragmites australis roots and exposed to real wastewater from Al-Daura refinery with 70 mg/L total petroleum hydrocarbons (TPH) concentration. The five selected rhizobacteria were examined in a biodegradation test for seven days to remove TPH. The results showed that 80% TPH degradation as the maximum value by Sphingomonas Paucimobilis as identified with Vitek® 2 Compact (France).

View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Bayesian method to estimate the parameters of Exponential Growth Model with Autocorrelation problem and different values of parameter of correlation-using simulation
...Show More Authors

We have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.

The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 05 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY OF OPTIMUM CONDITIONS FOR REMOVAL OF HEAVY METAL ELEMENTS BY LOCALLY ISOLATED FUNGI Aspergillus niger.: STUDY OF OPTIMUM CONDITIONS FOR REMOVAL OF HEAVY METAL ELEMENTS BY LOCALLY ISOLATED FUNGI Aspergillus niger.
...Show More Authors

The best optimum temperature for the isolate was 30○C while the pH for the maximum mineral removal was 6. The best primary mineral removal was 100mg/L, while the maximum removal for all minerals was obtained after 8 hrs, and the maximum removal efficiency was obtained after 24 hrs. The results have proved that the best aeration for maximum removal was obtained at rotation speed of 150 rpm/ minute. Inoculums of 5ml/ 100ml which contained 106 cell/ ml showed maximum removal for the isolate.

View Publication Preview PDF
Publication Date
Mon Jun 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study of the Drying of Ethanol using Zeolite Molecular Sieves
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Importance of Using the Internet of Things in Education
...Show More Authors

The subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (26)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Study of the effect of using nanomaterial in radiological shielding
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Study of ground properties of oxygen isotopes using Cosh potential
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF