This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Zeolite 5A was prepared by ion exchange of zeolite 4A prepared at 90°C and 2N NaOH concentration with 1.5 N calcium chloride solution at 90 °C and 5 hours, the ion exchange percentage was 66.6%. The formation experiments included mixing the prepared powder of 5A zeolite with different percentages of kaolin clay, citric acid and tartaric acid to form an irregular shape of zeolite granules. Tartaric acid binder gives higher bulk crushing strength than that obtained by using citric acid binder with no significant difference in the surface area. 7.5 weight% tartaric acid binder has the higher bulk crushing strength 206 newton with surface area 267.4 m2/g. Kaolin clay binder with 15 weight% gives the highest surface area 356 m2/g with bulk crushing strength 123 newton, it was chose as the best binder for zeolite 5A. The prepared granules of 5A zeolite were used for the adsorption experiments of H2O, and H2S contaminants from LPG. Different flow rates of LPG (3, 4, and 5 liter/minute) were studied. It was found that H2O is the strongly adsorbed component and H2S is the weakly adsorbed component. The best flow rate in this work for H2O, and H2S adsorption is 5 liter/minute of LPG. The adsorption capacity for H2O was 7.547 g/g and for H2S was 1.734 g/g.
High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ). The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and image sensing.
This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreSolid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.
A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.
A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].
The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe
... Show MoreThe revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreAn experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreBackground: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More