Used automobile oils were subjected to filtration to remove solid material and dehydration to remove water, gasoline and light components by using vacuum distillation under moderate pressure, and then the dehydrated waste oil is subjected to extraction by using liquid solvents. Two solvents, namely n-butanol and n-hexane were used to extract base oil from automobile used oil, so that the expensive base oil can be reused again.
The recovered base oil by using n-butanol solvent gives (88.67%) reduction in carbon residue, (75.93%) reduction in ash content, (93.73%) oil recovery, (95%) solvent recovery and (100.62) viscosity index, at (5:1) solvent to used oil ratio and (40 oC) extraction temperature, while using n-hexane solvent gives (60.25%) reduction in carbon residue, (76.54%) reduction in ash content, (89.06%) oil recovery, (94.78%) solvent recovery and (100.3) viscosity index, at (6:1) solvent to used oil ratio and (50 oC) extraction temperature.
That the electronic payments system plays an important role in the effectiveness of commercial banks by attracting domestic or foreign investors, especially in the banking sector , It must keep abreast of global developments and technology in the field of banking that lead to the effectiveness of the bank by providing modern banking services and good customer service that improves the reputation of the bank, as well as develop its activities and promotes economic development at the country level , The technological progress of the bank will increase the speed of conducting banking operations, accuracy and safer , here should be laws and regulations related to electronic payment systems keep pace with the la
... Show MoreIntended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted
... Show MoreBackground: Celiac disease is an autoimmune chronic disease that affects the human’s intestine and subsequently reflects its effect on the entire body health by retardation the absorption and immune mediated complications cause the involvement of oral health. The present study intended to evaluate the impact of the histopathological disease activity upon dental enamel defects and dental caries.
Subjects and methods: Forty celiac-diseased patients aged 7-11 years were collected from 3 different teaching hospitals in Baghdad classified by means of the histopathological activity of the intestinal disease according to modified Marsh-Ros
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreThe experimental study showed the use of closed cavity wall (the thickness of the cavity 5cm) made a percentage reduction in the cooling load caused by heat gain from the wall by (21.5 %) compared with the conventional wall. also the thermal resistance of the closed cavity was an average (0.2 m2.oC/W).
The experimental results of the study showed that the use of closed cavity wall reduced the average temperature of the inner surface of the wall during the day, and that the reduction was an average (0.45 oC) when compared with the conventional wall , as well as the use of closed cavity wall reduced the temperature difference range of the inner surface of the wall during the day, and that the
... Show MoreAccording to the European Union Water Framework Directive requirements, diatom metrics were used to assess the ecological status of surface waters in the Gaziantep central catchment (Turkey). A total of 42 diatom taxa were identified. A few environmental factors (especially lead, copper, orthophosphate, and chromium) played significant roles on the distribution of diatom assemblages among the sampling stations. The first two axes of the canonical correspondence analysis elucidated 91.6 % of the species–environment correlations with 13.9 % of the cumulative variance of species. The applied diatom indices (TIT – Trophic Index Turkey, TI – Trophic Index, and EPI-D – Eutrophication and/or Pollution Index-Diatom) showed different results
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show More