The study involved the removal of acidity from free fatty acid via the esterification reaction of oleic acid with ethanol. The reaction was done in a batch reactor using commercial 13X zeolite as a catalyst. The effects of temperatures (40 to 70 °C) and reaction time (up to 120 minutes) were studied using 6:1 mole ratio of pure ethanol to oleic acid and 5 wt. % of the catalyst. The results showed that acid removed increased with increasing temperature and reaction time. Also, the acidity removal rises sharply during the first reaction period and then changes slightly afterward. The highest acidity removal value was 67 % recorded at 110 minutes and 70 °C. An apparent homogeneous reversible reaction kinetic model has been proposed and solved with the experimentally obtained kinetics data to evaluate reaction rate constants versus temperature, pre-exponential factors, and activation energy values for the forward and the backward esterification reactions. The activation energies were 34.863 kJ/mol for the forward reaction and 29.731 kJ/mol for the backward reaction. The thermodynamics of the activation step of the forward and reverse reactions was studied based on the hypothesis of forming a complex material that decomposes into a product. The activation steps were studied using Eyring bimolecular collision theory approach, and both ΔH* and ΔS* were determined for forward and backward esterification reactions. The enthalpies of activation were 32.141 kJ/mol and 27.080 kJ/mol for the forward reaction and the backward reaction, and the entropies of activation were - 193.7 and -212.7 J/mol. K for the forward reaction and the backward reaction, respectively.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class I normal occlusion using Standardized photographic techniques and to verify the existence of possible gender differences. Materials and methods: Eighty Iraqi adult subjects (40 males and 40 females) with an age ranged between 18-25 years having class I normal occlusion were chosen for this study. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position which is mirror position which the patient looking straight into his eyes into the mirror mounted on the stand. The photographs were analyzed using A
... Show MoreABSTRACT Background: Improving the properties of heat- cured and self-cured acrylic resin have been studied by many researchers. However, little studies concerned with visible light cured resin (VLCR) improved through addition of nanofiller are available. The purpose of this study was to evaluate some properties of (VLCR) after addition of SiO2 nanofiller. Materials and Methods: SiO2 nanofiller were added to (VLCR) tray material after being dissolved in tetrahydrofuran (THF) solvent. According to the pilot study 2% SiO2 nanofiller addition exhibited better properties than the other percentages (1%, 3%). The main study conducted involved (100) specimens divided into 5 groups according to the test included. (20) Specimens were selecte
... Show MoreBackground: Pit and fissure sealant have been considered an outstanding adjunct to oral health care in the decrease of occlusal caries onset and low progression. The aims of this in vitro study were to evaluate the marginal microleakage of three different types of fissure sealants (SDI, Tg and tetric N-flow) by time interval, one day and 45 days, in the presence or absence of bonding agent among maxillary and mandibular teeth. Materials and methods: Seventy two sound human maxillary and mandibular first premolar teeth were collected which were free from obvious carious lesions. The teeth were randomly divided into two main equal groups, group (1) and group (2), each group consists of (36) teeth involving equal numbers of maxillary and mandi
... Show MoreThis study aims at identifying the notion of Post-Occupancy Evaluation (POE) pertinent to the performance of three general hospitals constructed inside the Sulaimani City, tracing the relationship between the quality of the indoor environments and medical staff (doctors and nurses) satisfaction level. Using some indoor environment elements in the right way will positively influence the mood, stress level of the medical staff, and patient recovery as a result. The POE toolkits (AEDET and ASPECT) have been implemented on targeted wards at the selected hospitals. AEDET and ASPECT questionnaires were distributed among 152 medical staff to obtain their perspectives. In total, 112 valid questionnaires were received. The medica
... Show MoreChronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the presence Philadelphia chromosome (Ph) which was created by a reciprocal translocation between chromosomes 9 and 22 (t [9;22] [q34;q11]. The approval of the 2nd generation TKI ( Nilotinib) takes the treatment of CML patients into new erea with more efficiency and mild to moderate adverse effects. This study was aimed at evaluation of molecular cytogenetic response by (FISH) for Nilotinib in Iraqi patients with assessment for electrolytes disturbances of Nilotinb by measuring a panel of electrolyte (Na+, K+, Ca++, PO4--- and Mg++) , where thirty Iraqi patients with CML who have resistance or no response to Imatinib treatment, attending to Baghdad Teaching Ho
... Show More