Preferred Language
Articles
/
ijcpe-832
Advanced Study of Promoted Pt /SAPO-11 Catalyst for Hydroisomerization of the n-Decane Model and Lube Oil
...Show More Authors

   SAPO-11 is synthesized from silicoaluminophosphate in the presence of di-n-propylamine as a template. The results show that the sample obtained has good crystallinity, 396m2/g BET surface area, and 0.35 cm3/g pore volume. The hydroisomerization activity of (0.25)Pt (1)Zr (0.5)W/SAPO-11 catalyst was determined using n-decane and base oil. All hydroisomerization experiments of n-decane were achieved at a fixed bed plug flow reactor at a temperature range of 200-275°C and  LHSV 0.5-2h-1.  The results show that the n-decane conversion increases with increasing temperature and decreasing LHSV, the maximum conversion of 66.7 % was achieved at temperature 275°C and LHSV of 0.5 h-1. Meanwhile, the same catalyst was used to improve base oil specification by increasing viscosity index and decreasing pour point. The isomerization reaction conditions, employed are temperature (200-300)ºC, the liquid hourly space velocity of 0.5-2h-1, and the pressure kept atmospheric. The present study shows that Pt Zr W/SAPO-11 minimizes the pour point of lubricating oil to -16°C at isomerization temperature of  300°C and LHSV of 0.5 h-1 and viscosity index 134.8.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
a study of the womens collages in usa
...Show More Authors

The study aims to identify the colleges women in the USA where he was browsing the Internet for five universities and sixty-two women's college located these colleges in 25 states only three general and other civil 51% supported by the churches and religious associations of various began its founding in Alqrnn eighteenth and continued in the nineteenth and twentieth and to provide an opportunity for women to complete higher education, while most men's colleges opened their doors to the admission of women and turned it on coeducation

View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Performance possibilities of the flute (Descriptive analytical study)
...Show More Authors

The nay is one of the important in stvument in Arabic music which is considered one of the oriental instruments used in the oriental music tect, and is also considered one of the basic instruments in Arabic music, It is used in many religious and mundane areas, through its expressive capabilities through which expression and conveyance of feelings to the recipient, despite their importance and role in music, and through the researcher's follow-up to this subject did not find a study on the potential capabilities of the machine. In view of the above, and given the importance of this subject at the researcher, the need arose for research to study (the potential of the flute machine)..

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Study the Nuclear Structure of Some Cobalt Isotopes
...Show More Authors

The nuclear structure of some cobalt (Co) isotopes with mass number A=56-60 has been studied depending on the effect of some physical properties such as the electromagnetic properties effects, such as, elastic longitudinal form factors, electric quadrupole moments, and magnetic dipole moments. The fp model space is used to present calculations using GXFP1 interaction by adopting the single particle wave functions of the harmonic oscillator. For all isotopes under consideration, the 40Ca nucleus is regarded as an inert core in fp model-space, while valence nucleons are moving through 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. The effects of core-polarization are obtained by the first orde

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of The College Of Languages (jcl)
Magic comparative study of the Old Testament mediator
...Show More Authors

Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .

     Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2016
Journal Name
Advances In Bioresearch
Study of the Pest insects in Plastic Houses
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation;
THE PSYCHOLOGY OF WOMEN'S DECISION-MAKING THEORETICAL STUDY
...Show More Authors