Modifying of HY/Zeolite is by loading nickel for applying catalyst in thermal catalytic cracking of furfural extract-40 from the lubricating base oil unit. The study involved the characterizing of HY-zeolite and promoted catalyst with nickel by X-ray diffraction analysis, Scanning electron microscopy (SEM), BET (Brunauer, Emmett, and Teller), and infrared ray analyses FTIR. The catalytic thermal cracking tubular reactor with a fixed bed with two type catalysts; HY/zeolite and Ni HY/zeolite, individually at a temperature of 580oC with LHSV 5h-1 was investigated. The results indicated that increase the conversion of catalytic cracking of furfural extract-40 also increases the yield of useful petroleum products and decreases the coke depsite on the Ni HY-Zeolite catalyst.
AlPO4 catalysts supported with WO3 were prepared by impregnating the catalysts with ammonium metatungstate. The catalysts were checked by X-ray Diffraction (XRD), AFM, and SEM; also, the catalysts analysis was done by X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the pore volume and surface area of the catalyst. The prepared catalyst has a surface area of 185.83 m2/g, pore volume of 0.645 cm3/g at a calcination temperature of 500°C for 3 hrs, and particle size of AlPO4 with an average of 35.36 nm. Transesterification of edible oil using WO3/AlPO4 was performed, it was observed that WO3/AlPO4 catalysts give high conversion of edible oil, and this is attributed to the high surface area, smaller particle size, and the
... Show MoreIn this work, porous silicon gas sensor hs been fabricated on n-type crystalline silicon (c-Si) wafers of (100) orientation denoted by n-PS using electrochemical etching (ECE) process at etching time 10 min and etching current density 40 mA/cm2. Deposition of the catalyst (Cu) is done by immersing porous silicon (PS) layer in solution consists of 3ml from (Cu) chloride with 4ml (HF) and 12ml (ethanol) and 1 ml (H2O2). The structural, morphological and gas sensing behavior of porous silicon has been studied. The formation of nanostructured silicon is confirmed by using X-ray diffraction (XRD) measurement as well as it shows the formation of an oxide silicon layer due to chemical reaction. Atomic force microscope for PS illustrates that the p
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreIn this work, we construct complete (K, n)-arcs in the projective plane over Galois field GF (11), where 12 2 ≤ ≤ n ,by using geometrical method (using the union of some maximum(k,2)- Arcs , we found (12,2)-arc, (19,3)-arc , (29,4)-arc, (38,5)-arc , (47,6)-arc, (58,7)-arc, (68,6)-arc, (81,9)-arc, (96,10)-arc, (109,11)-arc, (133,12)-arc, all of them are complete arc in PG(2, 11) over GF(11).
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show Moreالأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreA hierarchically porous structured zeolite composite was synthesized from NaX zeolite supported on carbonaceous porous material produced by thermal treatment for plum stones which is an agro-waste. This kind of inorganic-organic composite has an improved performance because bulky molecules can easily access the micropores due to the short diffusion path to the active sites which means a higher diffusion rate. The composite was prepared using a green synthesis method, including an eco-friendly polymer to attach NaX zeolite on the carbon surface by phase inversion. The synthesized composite was characterized using X-ray diffraction spectrometry, Fourier transforms infrared spectroscopy, field emission scanning electron microscopy, energy d
... Show MoreThe inhibitor property of curcuma longa L. extract in different concentrations of simulated refinery wastewater (0.05% - 2% wt) and at various temperatures (30, 35 and 40 ˚C) was investigated using weight loss method. The results showed that the presence of about 1.2 % (v/v) of curcuma extract gave about 84% inhibition indicating its effectiveness on mild steel corrosion in simulated refinery wastewater, besides the adsorption process on the mild steal surface obeyed the Langmuir adsorption isotherm.
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show More