Light naphtha one of the products from distillation column in oil refineries used as feedstock for gasoline production. The major constituents of light naphtha are (Normal Paraffin, Isoparaffin, Naphthene, and Aromatic). In this paper, we used zeolite (5A) with uniform pores size (5Aº) to separate normal paraffin from light naphtha, due to suitable pore size for this process and compare the behavior of adsorption with activated carbon which has a wide range of pores size (micropores and mesopores) and high surface area. The process is done in a continuous system - Fixed bed reactor- at the vapor phase with the constant conditions of flow rate 5 ml/min, temperature 180oC, pressure 1.6 bar and 100-gram weight of each adsorbents. We notice that the molecular sieve (5A) separated the normal paraffin (C4 – C8) from light naphtha feed until equilibrium (saturation). Activated carbon separated naphthene and aromatics, in addition, the other component of normal paraffin C6 (n-hexane), C7 (n-heptane) and C8 (n-octane). And there is increasing in weight percentage of C4 (n-butane), C5 (n-pentane) and the weight percentage of isoparaffin until equilibrium (Saturation). The study showed the difference in physical adsorption behavior and the effect of pore size on these processes.
Objective(s): To evaluate nurses’ Practice toward neonatal endotracheal suctioning procedure, and to determine the effectiveness of the interventional program on nurses’ practices, as well as to find out the relationship between nurses’ practice and their demographic characteristics.
Methodology: A Pre-experimental, one group design, was carried out to achieve the objectives of the current study using the evaluation approach and the implementation of the education program for the period from January 17 to June 31, 2022. A non- probability, purposive sample of (24) nurses were selected from the Neonatal Intensive Care Unit at Pediatric Teaching Hospital/ Medical City Department. A checklist w
... Show MoreSoftware Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreThe primary objective of current study was to evaluate the effects of different anastrozole dosages on the physiological performance, hematological profile, and serum biochemical parameters of broiler roosters. A total of Twenty-six Lohmann Brown roosters were randomly assigned to four treatment groups. The first group (T1) served as the control and received no anastrozole, while the other groups (T2, T3, and T4) were administered 0.2 mg, 0.4 mg, and 0.6 mg of anastrozole per day, respectively. The first and second groups consisted of six birds each, while the third and fourth groups had seven. The results demonstrated a significant improvement (P ≤ 0.05) in several physiological and biochemical parameters in the group receiving 0.6 mg of
... Show MoreThis paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
The results revealed that the incidence of Rhizoctonial damping-off of tomato was 65% and 67% in both rotations. Substrates of pine leaf litter and mushcom 2 suppressed infection reaching 59 and 60%. Mushcom1 restricted disease occurrence to 53%. In contrast, formulated Th + B. subtillus revealed a noticeable disease reduction reaching 33.16%, due to nutrients incited from mushroom thallus. The highest occurrence of damping-off (92 and 94 %) was found in control (sandy loam soil) during rotations. However, partial suppressive of Trichoderma spp. against R. solani was detected in different substrates. Mortality was 90% in control (non-amended soil). Finally, a comparable reduction of
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More