This research provides a novel technique for using metal organic frameworks (HKUST-1) as a gas storage system for liquefied petroleum gas (LPG) in Iraqi vehicles to avoid the drawbacks of the currently employed method of LPG gas storage. A low-cost adsorbent called HKUST-1 was prepared and characterized in this research to investigate its ability for propane storage at different temperatures (25, 30, 35, and 40 oC) and pressures of (1-7) bar. HKUST-1 was made using a hydrothermal method and characterized using powder X-ray diffraction, BET surface area, scanning electron microscopic (SEM), and Fourier Transforms infrared spectroscopy (FTIR). The HKUST-1 was produced using a hydrothermal technique and possesses a high crystallinity of up to 97%, surface area 3400 m2/g, and pore volume 0.7 cm3/g. The prepared adsorbent (HKUST-1) tested using volumetric method, the maximum adsorption capacity of propane was (10.499 mmol/g) at a temperature of 298K and a pressure of 7 bar. Furthermore, adsorption isotherm study was conducted to understand the system equilibrium (i.e., the fitting with one of the known models Langmuir, Freundlich, and Temkin isotherm models). It was observed that the Freundlich isotherm model fitted well the experimental data. The Clausius-Clapeyron equation was used to determine the heat of adsorption, and the results revealed that the heat of adsorption increased as the propane adsorption capacity increased. The prepared HKUST-1, which has a large surface area and a high adsorption capacity, can be used as a major solution for gas storage for liquefied petroleum gas (LPG) in Iraqi vehicles.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThis paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show More In this paper we prove a theorem about the existence and uniqueness common fixed point for two uncommenting self-mappings which defined on orbitally complete G-metric space. Where we use a general contraction condition.
The significant shortage of usable water resources necessitated the creation of safe and non-polluting ways to sterilize water and rehabilitate it for use. The aim of the present study was to examine the ability of using a gliding arc discharge to inactivate bacteria in water. Three types of Bacteria satisfactory were used to pollute water which are Escherichia coli (Gram-negative), Staphylococcus aurous (Gram-positive) and salmonella (Gram-negative). A DC power supply 12V at 100 Hz frequency was employed to produce plasma. pH of water is measured gradually during the plasma treatment process. Contaminated water treated by gliding arc discharge at steadying the gas flow rate (1.5 l/mi
The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreNahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a
... Show MoreThis paper introduced an algorithm for lossless image compression to compress natural and medical images. It is based on utilizing various casual fixed predictors of one or two dimension to get rid of the correlation or spatial redundancy embedded between image pixel values then a recursive polynomial model of a linear base is used.
The experimental results of the proposed compression method are promising in terms of preserving the details and the quality of the reconstructed images as well improving the compression ratio as compared with the extracted results of a traditional linear predicting coding system.
This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c