MCM-48 zeolites have unique properties from the surfaces and structure point of view as it’s shown in the results ,and unique and very sensitive to be prepared, have been experimentally prepared and utilized as a second-generation/ acid - catalyst for esterification reactions of oleic acid as a model oil for a free fatty acid source with Ethanol. The characterization of the catalyst used in the reaction has been identified by various methods indicating the prepared MCM-48 is highly matching the profile of common commercial MCM-48 zeolite. The XRF results show domination of SiO2 on the chemical structure with 99.1% and agreeable with the expected from MCM-48 for it's of silica-based, and the SEM results show the cubic crystallographic space group compatible with Ia3d space group giving the hexagonal surface structure. The AFM test gave an average particle diameter of 97.51 nm and an average catalyst roughness of 0.855 nm. Esterification reaction of oleic acid with ethanol on MCM-48 has been carried in a batch reactor with 5% the prepared MCM-48 zeolite catalyst loading gives 81% of conversion after one hour at 353K
A batch and flow injection (FI) spectrophotometric methods are described for the determination of barbituric acid in aqueous and urine samples. The method is based on the oxidative coupling reaction of barbituric acid with 4-aminoantipyrine and potassium iodate to form purple water soluble stable product at λ 510 nm. Good linearity for both methods was obtained ranging from 2 to 60 μg mL−1, 5–100 μg mL−1 for batch and FI techniques, respectively. The limit of detection (signal/noise = 3) of 0.45 μg mL−1 for batch method and 0.48 μg mL−1 for FI analysis was obtained. The proposed methods were applied successfully for the determination of barbituric acid in tap water, river water, and urine samples with good recoveries of 99.92
... Show MoreA field experiment was conducted at botanical garden of Department of Biology, College of Education for Pure Science (Ibn Al-Haitham), University of Baghdad, during the growth winter season of 2016-2017 to study the effect of different concentrations (0, 10, 20) mg.L-1 of abscisic acid and (0, 50, 100, 150) mg.L-1 of vitamin C and their interaction on some plant hormones of pea plant (Pisum sativum L.). The results showed that ABA 20 mg.L-1 decreased IAA about 27.44%, GA3 about 19.73% and Kinetin 15.37% while vitamin C with 150 mg.L-1 increased IAA 27.43%, GA3 45.31% and Kinetin 58.53%, but ABA increased about 23.01% for ABA and 34.93% for vitamin C compared with
... Show MoreThe inhibition ability of the new derivative (quinolin-2-one), namely (1-{[5-(2-Chloro-phenylazo)-2- hydroy-benzylidene]-amino}-4,7-dimethyl -6-nitro- 1H-quinolin-2-one (CPHAQ2O)) towards carbon steel corrosion in (3.5% NaCl) and (0.5M HCl) solutions were evaluated by potentiodynamic polarization at different inhibitor concentrations. Polarization curves showed that the evaluated compound acted as mixed inhibitors, and the adsorption of the evaluated inhibitor obeys the Langmuir adsorption isotherm in both salt and acid solutions. The results revealed that the percentage inhibition efficiency (%IE) in the salty solution (90.55%) is greater than that in the acidic solution (77.62%). The surface changes of the carbon steel and the film per
... Show MoreA simple, rapid and sensitive spectrophotometric method has been proposed for the determination of La (III) using 3-hydroxy -4-(2-hydroxy-phenyl azo) naphthalene -1- sulfonic acid as a chromogenic reagent. This method is based on the formation of a red-pink colored complex, upon the reaction of La(III) with the reagent in an alkaline medium (pH= 9.50), having a maximum absorbance at 459 nm. Beer's law is valid in the concentration range 0.512 µg.ml-1 with a Sandell's sensitivity value of 0.0188 µg.cm-2 and molar absorptivity of 7376.12 L.mol-1.cm-1. The stoichiometric composition of the chelate is 1:3. The effect of the presence of different cations as interferants in the determination of La(III) under the given optimum conditions
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, we study some cases of a common fixed point theorem for classes of firmly nonexpansive and generalized nonexpansive maps. In addition, we establish that the Picard-Mann iteration is faster than Noor iteration and we used Noor iteration to find the solution of delay differential equation.
The goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.