Preferred Language
Articles
/
ijcpe-258
Extraction of Essential Oils from Citrus By-Products Using Microwave Steam Distillation
...Show More Authors

The main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).

   Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extraction of essential oil is one of the most time and effort consuming process. Microwave-assisted extraction is a green technique for the extraction of natural products. (MASD) was better than (SD) in terms of rapidity, energy saving and yield. (MASD) gave higher yield than (SD) with shorter extraction time, yield of orange oil extracted by (MASD) was (1.150%) in (35min.) compared to (1.095%) in (45min.) by (SD) process, same results obtained for lemon and mandarin.

   The optimal microwave power was (135W) gave oil yield: (1.150%, 1.115%, 0.940%) for orange, lemon and mandarin respectively, (MASD) increased extraction temperature in short time and to a higher level compared to (SD). The optimal weight was (398.56gm) gave yield in (SD): (1.095%) and MASD (1.091%) for orange oil, same results obtained for lemon and mandarin. The best citrus peel type which gave the highest yield was orange followed by lemon then mandarin in both processes.

Limonene is the most abundant component in citrus essential oil, (GC) analysis showed that (SD) was more convenient to give high amount of limonene because of the graduate temperature rise, while in microwave extraction exposure to low microwave

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (35)
Crossref (8)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Applied Sciences
Improvement of Mechanical Welding Properties by using Induced Harmonic Vibration
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
The Iraqi Journal Of Agricultural Science 48 (5), 1197-1205‏
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design of Truncated Hyperboloid Solar Concentrator by Using Zemax Program
...Show More Authors

     A hyperboloid solar concentrator (HSC) was designed with a truncation angle side to the entrance aperture by simulation in the Zemax Optical Design software. The (HSC) has a wide exposure range to solar radiation due to the relatively large entrance aperture. The design consists of an entrance aperture facing the sun to obtain the largest possible amount of solar radiation, and a small exit aperture compared to the entrance aperture whose mission is to receive solar radiation after it enters the entrance aperture and reflects it from the inner reflective walls of the (HSC). In the exit aperture, there is a detector to measure the number of rays incident on it, which is a measure of the optical efficiency of the s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Prediction of consolidation due to dewatering by using MATLAB software
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Control of the AC Induction Motor by Using Fuzzy Logic
...Show More Authors

  The main aim of this research to study and recognize the specifications and main concepts of  (Fuzzy Logic) and its components and studying the practical experiments  of the (Fuzzy Logic)  techniques in the electrical engineering field through by using the (Fuzzy Logic) for controlling the three-phase AC induction motor by using (Matlab_ simulation_7) for modeling the system by using the computer

View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solve the problem of assignment by using multi-Objective programming
...Show More Authors

he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Simultaneous Determination of Sulfanilamide and Furosemide by Using Derivative Spectrophotometry
...Show More Authors

A simple, precise and accurate spectrophotometric method has been developed for simultaneous estimation of sulfanilamide and furosemide in their mixture by using first and second order derivative method in the ultraviolet region. The method depends on first and second derivative spectrophotometry, with zero-crossing and peak to base line and peak area measurements. The first derivative amplitudes at 214, 238 and 266 nm were selected for the assay of sulfanilamide and 240, 260, 284, 314 and 352 nm for furosemide. Peak area at 201222, 222-251 and 251-281 nm selected for estimation of sulfanilamide and at 229-249, 249270, 270-294, 294-333 and 333-382 nm for furosemide. The second derivative amplitudes at 220, 252 and 274 nm for sulfanilamid

... Show More
View Publication Preview PDF