Catalytic wet air oxidation of aqueous phenol solution was studied in a pilot plant trickle bed reactor using copper
oxide catalyst supported on alumina and silica. Catalysts were prepared by impregnating method. Effect of feed solution
pH (5.9, 7.3, and 9.2), gas flow rate (20%, 50%, 80%, and 100%), WHSV (1, 2, and 3 h-1), temperature (120°C, 140°C,
and 160°C), oxygen partial pressure (6, 9, 12 bar), and initial phenol concentration (1, 2, and 4 g/l).Generally, the
performance of the catalysts was better when the pH of feed solution was increased. The catalysts deactivation is related
to the dissolution of the metal oxides from the catalyst surface due to the acidic conditions. Phenol oxidation reaction
was strongly affected by WHSV, temperature, oxygen partial pressure, and initial phenol concentration. While gas flow
rate had a marginal effect.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreAbstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreThis study aims to recognize the process of using computer in publicschools in Ma`an governorate in terms of hardware, capabilities, and teachers usage. It also aims to identify the most important obstacles those schools face from a teachers perspective.
The study sample consists of (150) teachers from different disciplines. The researcher prepared two questionnaires related to the research pivotal, then presented to a group of arbitrators to be used in this final form. The data was analyzed statistically and the study concluded that there is a shortage in the computer services provided to teachers, and there is a w
... Show MoreThis study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a conce
... Show MoreThis study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a
... Show MoreBackground: Many countries recommend the use of long-acting reversible contraceptive intrauterine device immediately after cesarean delivery. The cesarean delivery rate in Iraqi public hospitals is 32.2% and may reach 85.8% in private hospitals. Immediate post-partum intrauterine device insertion at cesarean is rarely done in Iraq.
Objectives: To assess the safety and practicality of immediate post-partum intrauterine device insertion during cesarean delivery for family planning and pregnancy spacing in Iraqi women.
Subjects and Methods: A single arm clinical trial included 150 eligible women who attended Al-Elwiyah Maternity Teaching Hospital or Al Hayat Rahibat Hospita
... Show More