Kinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics, which indicates minimal mass transfer limitations in the trickle bed reacting system used in this study.
This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
major goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreCorpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language. In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedago
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreFibromuscular dysplasia (FMD) is a noninflammatory and nonatherosclerotic arteriopathy that is characterized by irregular cellular proliferation and deformed construction of the arterial wall that causes segmentation, constriction, or aneurysm in the intermediate-sized arteries. The incidence of FMD is 0.42–3.4%, and the unilateral occurrence is even rarer. Herein, we report a rare case of a localized extracranial carotid unilateral FMD associated with recurrent transient ischemic attacks (TIAs) treated by extracranial-intracranial bypass for indirect revascularization. The specific localization of the disease rendered our case unique.
In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreBackground: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show More