The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were represented by two empirical correlations. The gas holdup and the Sauter mean diameter of bubbles were correlated with both the power consumption and the hole diameter of the perforate plate.
The efficient removal of dissolved organic compounds (DOC) from wastewater has become a major environmental concern because of its high toxicity even at low concentrations. Therefore, a technique was needed to reduce these pollutants. Ion exchange technology (IE) was used with AmberliteTM IR120 Na, AmberliteTM IR96RF, and AmberliteTM IR402, firstly by using anion and mixed bed system, where the following variables are investigated for the process of adsorption: The height of the bed in column (8,10 and 14 cm), different concentrations of (DOC) content at constant flow rate. The use of an ion exchanger unit (continuous system) with three columns (cation, anion, and mixed bed) was studied.
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreDensity Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreFour antimony compounds were used in this inves as additives to retard combustion of unsaturated polyester and epoxy resins, namely: 1. Tetraethyl ammonium tribromoethylantimonates (additive I). 2. Tetraethyl ammonium chlorodibromoethylantimonates (additive II). 3. Tetraethyl ammonium trichloroethylantimonates (additive III). 4. Tetraethyl ammonium bromodichloroethylantimonates (additive IV). The effects of these additives on flammability of unsaturated polyester and epoxy resins have been studied by using sheets of the resins with weight percentages of (0.5,1.0,1.5,2.0,2.5&3.0%) of the additives in dimensions of (150 X150X3)mm .Three standard test methods were used to measure the flame retardation which are: (ASTM:D -2863), (ASTM:D-635
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha
... Show More