This research provides a novel technique for using metal organic frameworks (HKUST-1) as a gas storage system for liquefied petroleum gas (LPG) in Iraqi vehicles to avoid the drawbacks of the currently employed method of LPG gas storage. A low-cost adsorbent called HKUST-1 was prepared and characterized in this research to investigate its ability for propane storage at different temperatures (25, 30, 35, and 40 oC) and pressures of (1-7) bar. HKUST-1 was made using a hydrothermal method and characterized using powder X-ray diffraction, BET surface area, scanning electron microscopic (SEM), and Fourier Transforms infrared spectroscopy (FTIR). The HKUST-1 was produced using a hydrothermal technique and possesses a high crystallinity of up to 97%, surface area 3400 m2/g, and pore volume 0.7 cm3/g. The prepared adsorbent (HKUST-1) tested using volumetric method, the maximum adsorption capacity of propane was (10.499 mmol/g) at a temperature of 298K and a pressure of 7 bar. Furthermore, adsorption isotherm study was conducted to understand the system equilibrium (i.e., the fitting with one of the known models Langmuir, Freundlich, and Temkin isotherm models). It was observed that the Freundlich isotherm model fitted well the experimental data. The Clausius-Clapeyron equation was used to determine the heat of adsorption, and the results revealed that the heat of adsorption increased as the propane adsorption capacity increased. The prepared HKUST-1, which has a large surface area and a high adsorption capacity, can be used as a major solution for gas storage for liquefied petroleum gas (LPG) in Iraqi vehicles.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreNon-thermal or cold plasma create many reactive species and charged particles when brought into contact with plant extracts. The major constituents involve reactive oxygen species, reactive nitrogen species and plasma ultra-violets. These species can be used to synthesize biologically important nanoparticles. The current study addressed the effect of the green method-based preparation approach on the volumetric analysis of Zn nanoparticles. Under different operating conditions, the traditional thermal method and the microwave method as well as the plasma generation in dielectric barrier discharge reactor were adopted as a preparation approach in this study. The results generally show that the type of method used plays an important rol
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreCase Report.
To present a case of a previous complicated mandibular orthognathic surgery that aimed to setback the mandible in a female cleft lip and palate (CLP) patient, which led to bone necrosis on one side with subsequent severe mandibular deviation and facial asymmetry. We additionally reviewed the previous reports of similar complications, the pathophysiology and the factors that could lead to this dreadful result.
A 27-year-old female patient presented with a severe dentofacial deformity secondary to a complicated bilateral sagittal spli
A computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimensi
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.