The present research was conducted to reduce the sulfur content of Iraqi heavy naphtha by adsorption using different metals oxides over Y-Zeolite. The Y-Zeolite was synthesized by a sol-gel technique. The average size of zeolite was 92.39 nm, surface area 558 m2/g, and pore volume 0.231 cm3/g. The metals of nickel, zinc, and copper were dispersed by an impregnation method to prepare Ni/HY, Zn/HY, Cu/HY, and Ni + Zn /HY catalysts for desulfurization. The adsorptive desulfurization was carried out in a batch mode at different operating conditions such as mixing time (10,15,30,60, and 600 min) and catalyst dosage (0.2,0.4,0.6,0.8,1, and 1.2 g). The most of the sulfur compounds were removed at 10 min for all catalyst types. The maximum sulfur removal was 56% using (Ni+Zn)/HY catalyst at 1.2 g dose for 24 h. The adsorption kinetics and isotherm of sulfur removal were studied, and results indicated that desulfurization adsorption kinetic was 2nd order, and Temkin and Freundlich models were the best representation isotherm.
Single-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi
... Show MoreSalivary peroxidases have biological functions of particular importance to oral health. The aim of this paper is to shed the light on saliva and serum total peroxidases activity as well as the activity of each of salivary peroxidase (SPO) and myeloperoxidase (MPO) in patients with oral tumors. The studied participants were divided into two groups: the first group included 18 oral squamous cell carcinoma patients and 20 age and gender-matched healthy controls while the second group consisted of 20 oral ossifying fibroma patients and 23 age and gender-matched healthy controls. Total peroxidases activity was determined, and its specific activity was calculated in serum and whole mixed saliva as well as in the supernatant and pellet fractions
... Show MoreIn this study, silver-tungsten oxide core–shell nanoparticles (Ag–WO3 NPs) were synthesized by pulsed laser ablation in liquid employing a (1.06 µm) Q-switched Nd:YAG laser, at different Ag colloidal concentration environment (different core concentration). The produced Ag–WO3 core–shell NPs were subjected to characterization using UV–visible spectrophotometry, X-ray diffraction (XRD), transmission electron microscopy (TEM), energy-dispersive spectroscopy, electrical analysis, and photoluminescence PL. The UV–visible spectra exhibited distinct absorption peaks at around 200 and 405 nm, which attributed to the occurrence of surface Plasmon reson
This work involves theoretical and experimental studies for seven compounds to calculate the electrons spectrum and NLO properties. The theoretical study is done by employing the Time Depending Density Functional Theory TD-DFT and B3LYP/high basis set 6-311++G (2d,2p), using Gaussian program 09. Experimental study by UV/VIS spectrophotometer device to prove the theoretical study. Theoretical and experimental results were applicable in spectrum and energy gap values, in addition to convergence theoretically the energy gap results from ΔEHOMO-LUMO and UV/VIS. spectrum. Consider the theoretical method very appropriate to compounds that absorb in vacuum UV.
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this paper, we present multiple bit error correction coding scheme based on extended Hamming product code combined with type II HARQ using shared resources for on chip interconnect. The shared resources reduce the hardware complexity of the encoder and decoder compared to the existing three stages iterative decoding method for on chip interconnects. The proposed method of decoding achieves 20% and 28% reduction in area and power consumption respectively, with only small increase in decoder delay compared to the existing three stage iterative decoding scheme for multiple bit error correction. The proposed code also achieves excellent improvement in residual flit error rate and up to 58% of total power consumption compared to the other err
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The research tagged with the controversy of aesthetic interpretation between the sculptures and their titles in contemporary Iraqi sculpture, “Exhibition of Experiments in Contemporary Iraqi Sculpture as a Model”, and it is one of the new research that contributes to strengthening the critical path in the Iraqi fine movement, as the first chapter dealt with the research problem stemming from the question: What is the impact of the aesthetic hermeneutic controversy between the title and the title in contemporary Iraqi sculpture?, and do the titles of the sculptural works help to understand or enhance their contents?, The research objective included: To identify the controversy of the aesthetic interpretation of sculptures and their ti
... Show More