This research investigates the adsorption isotherm and adsorption kinetics of nitrogen from air using packed bed of Li-LSX zeolite to get medical oxygen. Experiments were carried out to estimate the produced oxygen purity under different operating conditions: input pressure of 0.5 – 2.5 bar, feed flow rate of air of 2 – 10 L.min-1 and packing height of 9-16 cm. The adsorption isotherm was studied at the best conditions of input pressure of 2.5 bar, the height of packing 16 cm, and flow rate 6 Lmin-1 at ambient temperature, at these conditions the highest purity of oxygen by this system 73.15 vol % of outlet gas was produced. Langmuir isotherm was the best models representing the experimental data., and the model parameters were the maximum monolayer coverage (qm) 200 mg. g-1 and Kl 0.00234 L.mg -1. Also, from the Freundlich isotherm model, the sorption intensity (n) indicated favorable sorption of 1.435. The average free energy estimated from the DRK isotherm model was 0.02 KJ.mol-1, which proved the adsorption process to follow physical nature. The results got from experiments showed a coincidence to the pseudo-first-order kinetic model.
This study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreSpatial Intelligence is a mental ability to understand and solve real-world problems. These visual-spatial representations are fundamental in learning various "STEM" topics, like digital drawing, art presentations, creating graphical representations, 2D designs. Opportunity to interact with real and/or virtual objects. It is a good opportunity in applying new techniques such as the augmenter, which is able to clarify mathematical tables, concepts and generalizations greatly to the visualization, understanding and mastery of concepts mathematically. The purpose of the research is to investigate impact of using AR technology in developing spatial intelligence for secondary school students, Baghdad. The quasi-experimental design was us
... Show MoreBackground: This research describes the methodology used for the preparation of selenium nanoparticles from Pseudomonas aeruginosa and their administration to lambs for lipid profile checking, administration of selenium nanoparticles as a medication in lambs results in hypolipidemia. Aim: The study aimed to investigate the potential of selenium nanoparticles in improving lipid profiles in lambs. Methods: Healthy lambs (n=10) of similar age and weight were selected for the study. The animals were housed in individual pens with free access to water and a standard diet. The lambs were randomly divided into two groups: the control group (n=5) and the treatment group (n=5). The control group received a standard diet, while the treatme
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreThis work is licensed under a Creative Commons Attribution 4.0 International License. Abstract This study examines the working capital management