A series of overbased magnesium fatty acids such as caprylate, caprate, laurate, myristate, palmitate, stearate and oleate) were synthesized by the reaction of the fatty acids with active – 60 magnesium oxide and carbon dioxide (CO2) gas at 60 oC in the presence of ammonia solution as catalyst, toluene / ethanol solvent mixture (9:1vol/vol) was added.
The prepared detergent additives were characterized by FTIR, 1HNMR and evaluated by blending each additive in various concentrations with medium lubricant oil fraction (60 stock) supplied by Iraqi Midland Refineries Company. The total base number (TBN, mg of KOH/g) was determined, and the results of TBN were treated by using two-way analysis of variance (ANOVA) test. It was found that the number of carbons in the fatty acid (C8-C18) used for overbased detergent preparation had slight effect on the TBN of the oil, while detergent concentrations (1-5% wt/wt) had a significant effect on the TBN of the blended oil.
The oxidation stability of the oil blends with 2% of overbased magnesium palmitate and overbased magnesium stearate detergents was evaluated, and the results showed that these blends gave higher oxidation stability compared with the blends with standard antioxidant supplied by Midland Refineries Company.
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
Moment invariants have wide applications in image recognition since they were proposed.
The research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More