This work deals with separation of the aromatic hydrocarbons benzene, toluene, and xylene (BTX) from reformate. The separation was examined using adsorption by molecular sieve zeolite 13X in a fixed bed process. The concentration of aromatic hydrocarbons in the influent and effluent streams was measured using gas chromatography. The effect of flow rate and bed length of adsorbent on the adsorption of multicomponent hydrocarbons and adsorption capacity of molecular sieve was studied. The tendency of aromatic hydrocarbons adsorption from reformate is in the order: benzene >toluene>xylenes.
Microbiological contamination by fungi impacts the quality and safety of wheat grain storage. This study aimed to evaluate the efficacy of cold plasma in restricting the growth of the fungus, Aspergillus niger, which was isolated from wheat grains. A dielectric barrier discharge (DBD) operating at atmospheric pressure generated cold plasma that was used to treat the fungus, and the impact of this treatment was investigated at various periods 1, 2, 4, 6, and 15 minutes. The results revealed a highly significant decrease in the growth and number of spores of Aspergillus niger compared to the controls. This study revealed an efficient technique for enhancing wheat grain storage that could be a foundation for further large-scale studies.
... Show MoreAs a result of the exacerbation of the problem of water pollution, research was directed towards studying the treatment using ceramic membranes, which proved to be highly effective in treating all water sources. The research aims to study the possibility of preparing a new type of ceramic membranes from Syrian zeolite that was not previously used in this field. In this research, ceramic membranes were prepared from Syrian raw zeolite in several stages. Zeolite sample was characterized, grinded, mixed with boric acid, pressed to form desks, treated thermally according to experiment program, finally coated with silver nanoparticles. Specifications of prepared membranes were determined according to reference methods, effectiveness of prepar
... Show MoreIntellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and
... Show MoreThe removal of commercial orange G dye from its aqueous solution by adsorption on tobacco leaves (TL) was studied in respect to different factor that affected the adsorption process. These factors including the tobacco leaves does, period of orange G adsorption, pH, and initial orange G dye concentration .Different types of isotherm models were used to describe the orange G dye adsorption onto the tobacco leaves. The experimental results were compared using Langmuir, and frundlich adsorption isotherm, the constants for these two isotherm models was determined. The results fitted frundlich model with value of correlation coefficient equal to (0.981). The capacity of adsorption for the orange G dye was carried out using various kinetic models
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCorona Virus Disease-2019 (COVID-19) is a novel virus belongs to the corona virus's family. It spreads very quickly and causes many deaths around the world. The early diagnosis of the disease can help in providing the proper therapy and saving the humans' life. However, it founded that the diagnosis of chest radiography can give an indicator of coronavirus. Thus, a Corner-based Weber Local Descriptor (CWLD) for COVID-19 diagnostics based on chest X-Ray image analysis is presented in this article. The histogram of Weber differential excitation and gradient orientation of the local regions surrounding points of interest are proposed to represent the patterns of the chest X-Ray image. Support Vector Machine (SVM) and Deep Belief Network (DBN)
... Show MoreColorectal cancer (CRC) is the most common disease and cause of death globally. The aim of the study is investigation and detection of some bacterial interfering with CRC occurrence and progression. The study conducted between September 2022 till February 2023, a total of 50 specimens were collected from confirmed CRC patients. In addition, 50 stool specimens were collected from Healthy volunteers, considers as control group. Isolation and identification of bacteria in all collected specimens were done by using cultural and differential media (blood agar, macconkey agar and Pfizer agar), as well as the VITEK- 2 compact system. The bacterial species, in the specimens of control were ( Escherichia coli 50 (86.20%), Klebsiella Pneumoni
... Show MoreLet G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.