In the present study the performance of drying process of dffirent solid materials by batch fluidized bed drying
under vacuum conditions was investigated. Three, different solid materials, namely; ion exchange resin-8528,
aspirin and paracetamol were used. The behavior of the drying curves as well as the rate of drying of these
materials had been studied. The experiments were caried out in a 0.0381 m column diameter fluidized by hot
air under yacuum conditions. Four variables affecting on the rate of drying were studied' these variables are
vacuum pressure (100 - 500 mm Hg), air temperature (303-323 K), particle size (0.3-0.8 mm) and initial
moisture content (0.35-0.55 g/g solid)-for resin and (0.1-0.2 g/g soltid) for aspirin and paracetamol. The study of
the characteristics of the drying curves showed that the drying behavior depends mainly on the type of the solid
material and on the operating conditions. It was found that the drying rate at vacuum conditions is enhanced by
increasing the operating temperature of the air and decreases by increasing the initial moisture content of the
material and the particle size. Moreover, an experiment was carried out to study the drying of aspirin solid
material which is dried in atmospheric fluidized bed dryer operating at the same conditions to compare the
temperature and time needed in both techniques. It was found that the temperature needed for vacuum fluidized
bed dryer (303 K) is less than needed by fluidized bed dryer operating at atmospheric pressure (323 K). A
simpliled model'for the drying of solids in the constant-rate period in a batch fluidized bed is developed,
considering the bed to consist of dense phase and bubble phase with heat and mass transfer between the phases.
It is assumed that the solids in dense phase to be in thermal equilibrium with the interstitial gas in the dense
phase. The bubble size, its rise velocity, and the bubble volume fraction are taken into account while developing
the model. The model is compared with experimental data reported in this study and found to match
satisfactorily.
In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp
... Show MoreLarge quantities of contaminated carwash wastewater are produced per day from carwash places. Extensively it contains large quantities of chemicals from detergents, oil, grease, heavy metals, suspended solids, types of hydrocarbons, and biological contents. A novel electrocoagulation treatment by foil electrodes was conducted to remove COD, turbidity, Total Dissolved Solids (TDS) from contaminated carwash wastewater and decrease its Electrical Conductivity (EC). A thin layer of aluminum foil is used as an electrode in this treatment process. The effects of different voltage and treatment times were studied. The best result was found at a voltage of 30 volts and treatment time 90 minute where the removal efficiency of COD
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More