In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad. One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.
The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and a
... Show MoreThe pollution producing from textile industries effluents is growing since the years, due to at discharged lots of it in water without treatment. The resulting effluent is colourful, highly toxic, and poses a significant environmental hazard. This problem can be solved by using enzymic biological treatment, where the Congo red dye was used with concentrations (100,200,300,500) mg /L, pH values (3,4,5,6,7,8), and variable temperatures (25,35,45)°C, the best removal of Congo red (CR) dye under optimum conditions for degradation was at concentration of 100 mg/L, at (pH 6, 25 °C) with efficiency of 99.85 % using the peroxidase enzyme extracted from red radish plant, while the removal percentage decreased when increase dye concentration
... Show MoreA study carried out for study effect of furfural that extracted from corn cobs by using specialized reaction system laboratory on phytopathogenic fungi: Pythium aphanidermatum, Rhizoctonia solani, Macrophomina phaseolina and Fusarium solani in addition to biocontrol fungus Trichoderma viride were isolated from infected plants and from their rhizosphere . The preparation results of different concentrations from stock solution in concentration 1% of furflural showed that The concentration was 100 ppm of furfural was inhibited the growth of P. aphanidermatum46.7 % and the was in concentration 400 ppm. while the concentration 500 ppm caused inhibition 50% and 41.1% of R. solani and F. solani respectively. Whereas the concentration 500 pp
... Show MoreThe topic of (pilgrims) of the old and modern subjects at the same time, as it extends his foot and is associated with the beginning of speech and argument, a modern because it is based on studies and research (and the theory of pilgrims) from (Austin and Cyril) through (Charles Breman) to (Aristotle) ), It is worth mentioning here to mention the role of (Hazem al - Qartagni) in mentioning the value of the pilgrimage of hair and saying the use of persuasion in the hair, is palatable and acceptable. Hence our research applied these views, and we chose the pendants as a model for that matter.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.