Preferred Language
Articles
/
ijcpe-346
ESTIMATION OF MASS TRANSFER COEFFICIENTS IN A PACKED DISTILLATION COLUMN USING BATCH MODE
...Show More Authors

This research adopts the estimation of mass transfer coefficient in batch packed bed distillation column as function of physical properties, liquid to vapour molar rates ratio (L / V), relative volatility (α), ratio of vapour and liquid diffusivities (DV / DL), ratio of vapour and liquid densities (ρV / ρL), ratio of vapour and liquid viscosities (μV/ μL).
The experiments are done using binary systems, (Ethanol Water), (Methanol Water), (Methanol Ethanol), (Benzene Hexane), (Benzene Toluene). Statistical program (multiple regression analysis) is used for estimating the overall mass transfer coefficient of vapour and liquid phases (KOV and KOL) in a correlation which represented the data fairly well.

KOV = 3.3 * 10-10 α-0.7 (DV / DL) 0.65 (L / V) 3.5 (ρV / ρL) 1.25 (μV / μL) -5.0

KOL = 2.8 * 10-6 α-0.95 (DV / DL) 0.03 (L / V) 1.15 (ρV / ρL )0.077 (μV / μL) -0.9

In this research a method where the resistances to mass transfer in both phases are accounted for separately through the use of HTU-NTU model for each phase

Z=HTUOV.NTUOV and Z=HTUOL.NTUOL

Results show that both overall vapour and liquid mass transfer coefficient are increased with liquid to vapour molar rates ratio, vapour to liquid diffusivities ratio and vapor to liquid densities ratio, but decreased with increasing the relative volatility and vapour to liquid viscosities ratio.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Theoretical Estimation of Electronic Flow Rate at Al-TiO<sub>2</sub> Interfaces System
...Show More Authors
Abstract<p>The mechanism of the electronic flow rate at Al-TiO<sub>2</sub> interfaces system has been studied using the postulate of electronic quantum theory. The different structural of two materials lead to suggestion the continuum energy level for Al metal and TiO<sub>2</sub> semiconductor. The electronic flow rate at the Al-TiO2 complex has affected by transition energy, coupling strength and contact at the interface of two materials. The flow charge rate at Al-TiO2 is increased by increasing coupling strength and decreasing transition energy.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Science
Estimation and Analysis of Solar Radiation on Horizontal and Inclined Surface for Baghdad City
...Show More Authors

    The knowledge of the quantity of total solar radiation on horizontal and inclined surfaces is very important in the calculations of heating and cooling loads in architecture and in the design of certain solar energy applications such as photovoltaic and solar collectors. This paper estimates the total solar radiation on inclined surfaces in Baghdad (Lat. 330 21' N      440 14' long and 34m above MSL).  A good model was used to estimate hourly total solar radiation on the inclined surface with different elevations (150, 300, 450, 600, 750, 900) from a horizontal surface. The mean hourly, daily and monthl

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Estimation of Parameters for the Gumbel Type-I Distribution under Type-II Censoring Scheme
...Show More Authors

This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Some Estimation for the Parameters and Hazard Function of Kummer Beta Generalized Normal Distribution
...Show More Authors

Transforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Some of Robust the Non-Parametric Methods for Semi-Parametric Regression Models Estimation
...Show More Authors

In this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then  these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.

The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Estimation the Levels of Some Inflammatory Markers Among Young Iraqi Smokers and Non Smokers
...Show More Authors

In this study it was found that a significant decrease in the level of leptin in young
Iraqi smokers (16+ 0.7ng/mL) compared to non smokers(24.2+ 4.5ng/mL) while, B2
microglobulin and CRPwas significantly increased in the smokers (1.2 + 0.3μg/mL),
(4.07+ 0.02mg/L) respectively, compared to non smokers (0.6 + 0.9μg/mL) ,( 2.88+
0.002mg/L) respectively, the presented data indicates the effect of smoking on these
immunological markers.

View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More