Preferred Language
Articles
/
ijcpe-350
CRACKING ACTIVITY OF PREPARED Y-ZEOLITE CATALYST USING CUMENE ON FLUIDIZED BED REACTOR
...Show More Authors

The catalytic activity of faujasite type NaY catalysts prepared from local clay (kaolin) with different Si/Al ratio was studied using cumene cracking as a model for catalytic cracking process in the temperature range of 450-525° C, weight hourly space velocity (WHSV) of 5-20 h1, particle size ≤75μm and atmospheric pressure. The catalytic activity was investigated using experimental laboratory plant scale of fluidized bed reactor.
It was found that the cumene conversion increases with increasing temperature and decreasing WHSV. At 525° C and WHSV 5 h-1, the conversion was 42.36 and 35.43 mol% for catalyst with 3.54 Si/Al ratio and Catalyst with 5.75 Si/Al ratio, respectively, while at 450° C and at the same WHSV, the conversion was decreased to 29.15 and 21.86 mol% respectively, and the catalyst of 5.75 Si/Al ratio gave the higher cumene activity than the catalyst with 3.54 Si/Al ratio.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent of the social worker’s use of group discussion technique in professional practice with school activity groups in Tubas Governorate schools
...Show More Authors

This study aimed at identifying the extent to which the social worker used the techniques of group discussion in the professional practice with the groups of school activity in the schools of Tubas governorate in light of some variables (gender, years of experience, academic qualification). The analytical descriptive method was used due to its suitability for the objectives of the study.  A questionnaire was designed to collect data that included (30) items, distributed in three areas .The validity and reliability of the tool were verified and then distributed to the study sample.

 

The results of the study showed that the highest averages were in the discussion stage domain, where the pre-discussion stage was m

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization and Studying the Enzyme Activity of New Benzothiazole Schiff Base Ligand (HL) and Its Complexes with Some of Metal Ions
...Show More Authors

Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Phytochemical composition, total phenolic content and antioxidant activity of Anadara granosa (Linnaeus, 1758) collected from the east coast of South Sumatra, Indonesia
...Show More Authors

Anadara granosa is a species of the class bivalve commonly found on the east coast of South Sumatra as a fishery commodity. This species has not been widely studied as a source of new bioactive compounds that have antioxidant abilities. This study aims to analyze the antioxidant ability of A. granosa against DPPH radicals and its phytochemical profile qualitatively. Samples were taken at the fishing port of Sungsang Village, South Sumatra, Indonesia. Furthermore, the samples were extracted using ethanol as a solvent and tested for antioxidants against DPPH radicals, total phenol analysis, and preliminary phytochemical test. Based on the antioxidant test results, the IC50 value of the ethanolic extract of

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the reserve requirement ratio in the activity of the bank credit: Applied Research in a sample of Iraqi private banks
...Show More Authors

The research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied  research on    a sample of Iraqi banks), was chosen on basis of the Iraqi  private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with  the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up  to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive  monetary tool  so called the compulsory reserve.This is why we intended to overlook at this contradictional  problome

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Preparation, characterization, antioxidant activity of 1-(2-furoyl) thiourea derivatives and study the molecular docking of them as potent inhibitors of Urease enzyme
...Show More Authors

In this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and  by studying  molecular docking using Autodock (4.2.6) software.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 15 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization and Study of the Biological Activity of New Metal Complexes of Ligand[2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) Propanoic Acid (BHP)
...Show More Authors

In this paper, series of new complexes of Manganese(II), Cobalt(II), Nickel (II) Cupper(II) Zinc(II), Cadmium(II) and Mercury (II) are prepared from the new ligand [2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) propanoic acid (BHP) derived from tyrosine and benzoylisothiocyanate .Chemical structures are obtained from their 1 H, 13CNMR spectra (for BHP), elemental microanalyses, molar conductance, FTIR, UV–Vis, magnetic susceptibility in addition to TGA/DTG and DSC analysis, the suggested geometry for all complexes was tetrahedral. The biological activity of BHP and its complexes has been extensively studied against two bacterial species Staphylococcus aurous (G+) and Escherichia coli (G-) by agar-well diffusion technique, where Mn(II), Co

... Show More
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Lightweight hamming product code based multiple bit error correction coding scheme using shared resources for on chip interconnects
...Show More Authors

In this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF