The toxic lead additives to gasoline are no longer used in many countries around the world. Many other countries are now phasing out the lead in gasoline. Although the lead fuel is still in use in Iraq, several plans are considered to phase out the lead. The use of organic compounds to replace the lead additives in gasoline is considered now as an option in Iraqi refineries. The main objective of this project was preparation of premium gasoline, by blending of gasoline with Alternative additives (alcohol, aromatic) to enhancing octane number of Al-Doura gasoline pool. Improved gasoline was tested by ASTM standard method which includes octane number measuring by CFR engine analyzer. Gasoline pool RON (80) was used and selective components were added to the gasoline pool (1-3%) to improving it octane, such as ethanol, methanol,isopropanol,isobutanol, benzene, nitrobenzene, Aniline, and nitro aniline. Octane number of blends was measured by CFR engine. Mixture of alternative additives was prepared and adding in 1-3%vol to the gasoline pool. It was found that the additives show significant improvement of octane number of gasoline but the important increasing of RON was shown on use mixture of alcohols and aniline.
The process of discharging the quantities of dyes resulting from industrial processes with wastewater leads to the occurrence of a serious environmental problem that threatens the environmental health security of humans. Therefore, a number of studies have been addressed that include presenting many physical and chemical treatment methods to get rid or reduce the proportion of pigments such as biological decomposition, ion exchange, and sedimentation. Chemotherapy, reverse osmosis, coagulation, Toxic sludge generation, flocculation. In addition to the above, this review deals with a number of studies that present activated carbon of plant origin, methods of obtaining it, types and advantages of it being cheap and environmentally friendly. A
... Show MoreIn this study involves removing of Brilliant Dyes, were which (Brilliant Green {BG} and Brilliant Cresyl Blue {BCB}) by using Iraqi Siliceous Rocks Powder (SRP). Adsorption isotherms were studied and the factors which prefer it, like temperature and salt effect, Adsorption isotherms of dyes, Brilliant Cresyl Blue {BCB} was found to be comparable to Langmuir equation according to Giles classification, isotherms dye Brilliant Green {BG} was found to be comparable to Freundlich equation more than dye Brilliant Blue {BCB} according to Giles classification. The adsorption process on this surface (SRP) studied at different temperatures, the results showed that the adsorption of dyes (BCB, BG) on the surface increased with increased temperature (E
... Show MoreThe subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern
... Show MoreThe study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
