This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Zeolite 5A was prepared by ion exchange of zeolite 4A prepared at 90°C and 2N NaOH concentration with 1.5 N calcium chloride solution at 90 °C and 5 hours, the ion exchange percentage was 66.6%. The formation experiments included mixing the prepared powder of 5A zeolite with different percentages of kaolin clay, citric acid and tartaric acid to form an irregular shape of zeolite granules. Tartaric acid binder gives higher bulk crushing strength than that obtained by using citric acid binder with no significant difference in the surface area. 7.5 weight% tartaric acid binder has the higher bulk crushing strength 206 newton with surface area 267.4 m2/g. Kaolin clay binder with 15 weight% gives the highest surface area 356 m2/g with bulk crushing strength 123 newton, it was chose as the best binder for zeolite 5A. The prepared granules of 5A zeolite were used for the adsorption experiments of H2O, and H2S contaminants from LPG. Different flow rates of LPG (3, 4, and 5 liter/minute) were studied. It was found that H2O is the strongly adsorbed component and H2S is the weakly adsorbed component. The best flow rate in this work for H2O, and H2S adsorption is 5 liter/minute of LPG. The adsorption capacity for H2O was 7.547 g/g and for H2S was 1.734 g/g.
<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and
... Show MoreThe ability to inhibit corrosion of low carbon steel in a salt solution (3.5%NaCl) has been checked with three real expired drugs (Cloxacillin, Amoxicillin, Ceflaxin) with variable concentrations (0, 250, 500, 750) mg/L were examined in the weight loss. The inhibition efficiency of the Cloxacillin 750 mg/L showed the highest value (82.8125 %) and the best inhibitor of the rest of the antibiotics. The different concentrations of Cloxacillin drug (0, 250, 500, 750) mg/L and temperature (25, 35, 45, 55) oC were studied as variables with potentiodynamic polarization, Scanning Electron Microscopy (SEM) for surface morphology and electrochemical impedance spectroscopy (EIS) depending on current values and the resistance of charge to
... Show MoreThe research aimed at finding out the effect of functional rotation on the tax performance of the employees of the General Authority for Taxes through the five-meter questionnaire prepared according to the required data. The data obtained from the research sample were analyzed. The results showed a significant effect of recycling In the tax performance, and this is evident from the proportion of his contribution to the interpretation of the total variation, which is a good indicator of the impact of functional rotation in the performance of the body sample research.
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreThis study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreIn this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.
Abstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More