Preferred Language
Articles
/
ijcpe-482
Concentration of Hydrogen Peroxide by Batch Distillation Column
...Show More Authors

An investigation was conducted to study the concentration of hydrogen peroxide by vacuum distillation. The effect of the process variables (such as vacuum pressure, reflux ratio, time of distillation, and packing height of the column used in the distillation process) on the concentration of hydrogen peroxide were investigated. During the third stage of distillation (95 wt.%) concentration was obtained.

Box-Wilson central composite rotatable design is used to design the experimental work for the mentioned variables. It was found that the concentration of hydrogen peroxide increases with Increasing vacuum pressure, decreasing reflux ratio, increasing the time of distillation and increasing the packing height.

The second order polynomial regression analysis of the objective response (concentration of hydrogen peroxide). with respect to the four  variable, using statistical program gave the following  equations:

Y1 = 54.87 - 0.27 P - 81.45 R .+ 16.36 t + 0.69 H + 55.67 R2 - 0.0035 H2

Y = 104.04 - 0.44 P - 140.62 R + 19.8 t + 0.211 H + 0.0018 P+ 105.25 R2-3.33 r

Y3  = 83.79 - 0.18 P - I 9.04 R + I J.14 t - 0.094 H - 0.0047 P 2 - 26.78 R2 - 2.78 t2

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancement of Biogas production and organic reduction of sludge by different pre-treatment processes
...Show More Authors

Anaerobic digestion (AD) is the most common process for dealing with primary and secondary wastewater sludge. In the present work, four pre-treatment methods (ultrasonic, chemical, thermal, and thermo-chemical) are investigated in Al-Rustumya Wastewater Treatment plant in order to find their effect on biogas production and volatile solid removal efficiency during anaerobic digestion.
Two frequencies of ultrasonic wave were used 30 KHz and 50 KHz during the pre-treatment. Sodium hydroxide was added in different amounts to give three pH values of 9, 10 and 11 in chemical pre-treating processes. The sludge was heated at 60oC and 80oC through thermal pre-treatment experiment. Also, the sludge was treated thermo-chemically at 80 oC and pH

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Springer Series In Geomechanics And Geoengineering
Improvement of Unconfined Compressive Strength of Soft Clay by Grouting Gel and Silica Fume
...Show More Authors

Scopus (26)
Crossref (18)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Study of Spectral and thermal properties of Selenium Diatomic Halides by Semi-empirical Treatment
...Show More Authors

The spectroscopic properties, potential energy curve, dipole moments, total charge density, Electrostatic potential as well as the thermodynamic properties of selenium diatomic halides have been studied using code Mopac.7.21 and hyperchem, semi-empirical molecular orbital of MNDO-method (modified neglected of differential overlap) of parameterization PM3 involving quantum mechanical semi-empirical Hamiltonian. The relevant molecular parameters like interatomic distance, bond angle, dihedral angle and net charge were also calculated.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Effect of Coefficient of Variation on the Reliability of Collapse Potential's Equation Predicted by ANNs
...Show More Authors

In this paper, the Reliability Analysis with utilizing a Monte Carlo simulation (MCS) process was conducted on the equation of the collapse potential predicted by ANN to study its reliability when utilized in a situation of soil that has uncertainty in its properties. The prediction equation utilized in this study was developed previously by the authors. The probabilities of failure were then plotted against a range of uncertainties expressed in terms of coefficient of variation. As a result of reliability analysis, it was found that the collapse potential equation showed a high degree of reliability in case of uncertainty in gypseous sandy soil properties within the specified coefficient of variation (COV) for each property. When t

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Investigation of nanostructured and gas sensing of tin dioxide films prepared by oxidation of Sn
...Show More Authors

Publication Date
Tue Jan 01 2008
Journal Name
J Bagh College Of Dentistry
Assessment of consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite
...Show More Authors

Background: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More