Preferred Language
Articles
/
ijcpe-918
Kinetics and Activation Complex Thermodynamic Study of the Acidity Removal of Oleic Acid via Esterification Reaction on Commercial 13X Zeolite
...Show More Authors

   The study involved the removal of acidity from free fatty acid via the esterification reaction of oleic acid with ethanol. The reaction was done in a batch reactor using commercial 13X zeolite as a catalyst. The effects of temperatures (40 to 70 °C) and reaction time (up to 120 minutes) were studied using 6:1 mole ratio of pure ethanol to oleic acid and 5 wt. % of the catalyst. The results showed that acid removed increased with increasing temperature and reaction time. Also, the acidity removal rises sharply during the first reaction period and then changes slightly afterward. The highest acidity removal value was 67 % recorded at 110 minutes and 70 °C. An apparent homogeneous reversible reaction kinetic model has been proposed and solved with the experimentally obtained kinetics data to evaluate reaction rate constants versus temperature, pre-exponential factors, and activation energy values for the forward and the backward esterification reactions. The activation energies were 34.863 kJ/mol for the forward reaction and 29.731 kJ/mol for the backward reaction. The thermodynamics of the activation step of the forward and reverse reactions was studied based on the hypothesis of forming a complex material that decomposes into a product. The activation steps were studied using Eyring bimolecular collision theory approach, and both ΔH* and ΔS* were determined for forward and backward esterification reactions. The enthalpies of activation were 32.141 kJ/mol and 27.080 kJ/mol for the forward reaction and the backward reaction, and the entropies of activation were - 193.7 and -212.7 J/mol. K for the forward reaction and the backward reaction, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (236)
Crossref (179)
Scopus Clarivate Crossref
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Photogrammetric analysis of facial soft tissue profile of Iraqi adults sample with Class I normal occlusion: (A cross sectional study)
...Show More Authors

Background: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class I normal occlusion using Standardized photographic techniques and to verify the existence of possible gender differences. Materials and methods: Eighty Iraqi adult subjects (40 males and 40 females) with an age ranged between 18-25 years having class I normal occlusion were chosen for this study. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position which is mirror position which the patient looking straight into his eyes into the mirror mounted on the stand. The photographs were analyzed using A

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Testing Different Properties of A Light-Cured Denture Base Material After Addition of Silicon Oxide Nanofiller (An in Vitro Study)
...Show More Authors

ABSTRACT Background: Improving the properties of heat- cured and self-cured acrylic resin have been studied by many researchers. However, little studies concerned with visible light cured resin (VLCR) improved through addition of nanofiller are available. The purpose of this study was to evaluate some properties of (VLCR) after addition of SiO2 nanofiller. Materials and Methods: SiO2 nanofiller were added to (VLCR) tray material after being dissolved in tetrahydrofuran (THF) solvent. According to the pilot study 2% SiO2 nanofiller addition exhibited better properties than the other percentages (1%, 3%). The main study conducted involved (100) specimens divided into 5 groups according to the test included. (20) Specimens were selecte

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Nov 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of three fissure sealants microleakage with presence or absence of bonding agent through time intervals (In vitro study)
...Show More Authors

Background: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 28 2021
Journal Name
Journal Of Engineering
Post-occupancy evaluation Correlated with Medical Staffs' Satisfaction: A Case Study of Indoor Environments of General Hospitals in Sulaimani City
...Show More Authors

This study aims at identifying the notion of Post-Occupancy Evaluation (POE) pertinent to the performance of three general hospitals constructed inside the Sulaimani City, tracing the relationship between the quality of the indoor environments and medical staff (doctors and nurses) satisfaction level. Using some indoor environment elements in the right way will positively influence the mood, stress level of the medical staff, and patient recovery as a result. The POE toolkits (AEDET and ASPECT) have been implemented on targeted wards at the selected hospitals. AEDET and ASPECT questionnaires were distributed among 152 medical staff to obtain their perspectives. In total, 112 valid questionnaires were received. The medica

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Evaluation of Electrolytes Disturbances in Iraqi Chronic Myeloid Leukemia Patients treated with Nilotinib with Monitoring of Response by FISH Study
...Show More Authors

Chronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the presence Philadelphia chromosome (Ph) which was created by a reciprocal translocation between chromosomes 9 and 22 (t [9;22] [q34;q11]. The approval of the 2nd generation TKI ( Nilotinib) takes the treatment of CML patients into new erea with more efficiency and mild to moderate adverse effects. This study was aimed at evaluation of molecular cytogenetic response by (FISH) for Nilotinib in Iraqi patients with assessment for electrolytes disturbances of Nilotinb by measuring a panel of electrolyte (Na+, K+, Ca++, PO4--- and Mg++) , where thirty Iraqi patients with CML who have resistance or no response to Imatinib treatment, attending to Baghdad Teaching Ho

... Show More
View Publication Preview PDF
Crossref