This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Zeolite 5A was prepared by ion exchange of zeolite 4A prepared at 90°C and 2N NaOH concentration with 1.5 N calcium chloride solution at 90 °C and 5 hours, the ion exchange percentage was 66.6%. The formation experiments included mixing the prepared powder of 5A zeolite with different percentages of kaolin clay, citric acid and tartaric acid to form an irregular shape of zeolite granules. Tartaric acid binder gives higher bulk crushing strength than that obtained by using citric acid binder with no significant difference in the surface area. 7.5 weight% tartaric acid binder has the higher bulk crushing strength 206 newton with surface area 267.4 m2/g. Kaolin clay binder with 15 weight% gives the highest surface area 356 m2/g with bulk crushing strength 123 newton, it was chose as the best binder for zeolite 5A. The prepared granules of 5A zeolite were used for the adsorption experiments of H2O, and H2S contaminants from LPG. Different flow rates of LPG (3, 4, and 5 liter/minute) were studied. It was found that H2O is the strongly adsorbed component and H2S is the weakly adsorbed component. The best flow rate in this work for H2O, and H2S adsorption is 5 liter/minute of LPG. The adsorption capacity for H2O was 7.547 g/g and for H2S was 1.734 g/g.
Abstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the