Depletion of fossil fuel is one of the main reasons why the bioethanol has become popular. It is a renewable energy source. In order to meet the great demand of bioethanol, it is best that the bioethanol production is from cheap raw materials. Since the golden shower fruit is not being utilized and is considered as waste material, hence, this study was conducted to make use of the large volume of the residue as feedstock to test its potential for bioethanol extraction.The main goal of this study is to obtain the most volume of bioethanol from the golden shower fruit liquid residue by the factors, days of fermentation (3, 5, and 7 days) and sugar concentration (15, 20 and 25 brix) of the liquid residue. Also, part of the study is to compute the cost of production in extracting bioethanol from the golden shower fruit. Each treatment was replicated three (3) times. The Two-Factorial Analysis of Variance (ANOVA) of the Complete Randomized Design (CRD) was used to analyze the treatments. Treatments means were compared using the Duncan’s Multiple Range Test (DMRT).
The aim of this research is to study the surface alteration characteristics and surface morphology of the superhydrophobic/hydrophobic nanocomposite coatings prepared by an electrospinning method to coat various materials such as glass and metal. This is considered as a low cost method of fabrication for polymer solutions of Polystyrene (PS), Polymethylmethacrylate (PMMA) and Silicone Rubber (RTV). Si were prepared in various wt% of composition for each solutions. Contact angle measurement, surface tension, viscosity, roughness tests were calculated for all specimens. SEM showed the morphology of the surfaces after coated. PS and PMMA showed superhydrophobic properties for metal substrate, while Si showed hydroph
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In this study, the circulating fluidized bed was used to remove the Tetracycline from wastewater utilizing a pistachio shell coated with ZnO nanoparticles. Several parameters including, Tetracycline solution flowrate, initial static bed height, Tetracycline initial concentration and airflow rate were systematically examined to show their effect on the breakthrough curve and the required time to reach the adsorption capacity and thus draw the fully saturated curve of the adsorbent. Results showed that using ZnO nanoparticles will increase the adsorbent surface area and pores and as a result the adsorption increased, also the required time for adsorbent saturation increased and thus the removal efficiency may be achieved at mi
... Show MoreDifferent injection material types were tried in the injection of soft clay, such as lime (L), silica fume (SF), and leycobond-h (LH). In this study, experiments were made to study the effect of injection on soft clay consolidation settlement. A sample of natural soft clayey soil was investigated in the laboratory and the sample was injected with each of the grout materials used, L, SF, L + SF, and L + SF + LH. A 20 cm3 of each slurry grout was conducted into the soil, which was compacted in California Bearing Ratio (CBR) mold and cured for 7 days, and then the sample was loaded to 80 N load by a circular steel footing 60 mm in diameter. The settlement was r
Critical buckling temperature of laminated plate under thermal load varied linearly along the thickness, is developed using a higher-order shape function which depends on a parameter ‘‘m’’, which is improved to obtain results for thin and thick plates. Laminated plates’ equations of motion are obtained using virtual work principle and solved for simply supported boundary conditions. Angle and cross laminates thermal buckled mode shapes with different E1/E2 proportion, number of plies, (α2/α1) proportion, aspect ratios, are investigated. It is observed that this shape function gives thermal buckling for thin and thick plates but with m = 0.05 that agree well with other theories and linear distribution of temperature giv
... Show MoreStone columns are widely used globally due to theirversatility and relative wide applicability to treat different soil and foundation situations but much of the research undertaken to date has focused on their use in soft soils. In countries like Iraq the use of stone columns is still limited from a practical point of view, chiefly as many other soil conditions are commonly encountered. These include collapsible soils: soils that are prone to relatively rapid volume compressions (through collapse of metastable fabrics) that occur due to the action of load and/or increases in water content. Recent work has opened up the possibility to use stone columns in these soils by the use of encasement, thereby overcoming the impact of loss of lateral
... Show MoreThe philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreAbstract
The public budget in Iraq is still prepared according to the traditional base that allocates the amounts of budget the current year based on the budget of previous year with an increase in estimations with random proportions without connecting the input (financial, human resources and asset )with their output (quantitatively and qualitatively)this caused waste and lose in the available resources therefore the output of budget showed be adapted is such a way that achieving connection between its input and output and to be appropriate with the organizational structure of the state without intrinsic change in its work .this may be realized by adopting the accounting of
... Show More