Preferred Language
Articles
/
joe-2694
Kinetics of Fixed Bed Sorption Processes
...Show More Authors

Adsorption and ion exchange are examples of fixed-bed sorption processes that show transient behavior. This means that differential equations are needed to design them. As a result, numerical methods are commonly utilized to solve these equations. The solution frequently used in analytical methods is called the Thomas solution. Thomas gave a complete solution that adds a nonlinear equilibrium relationship that depends on second-order reaction kinetics. A computational approach was devised to solve the Thomas model. The Thomas model's validity was established by conducting three distinct sets of experiments. The first entails the adsorption of acetic acid from the air through the utilization of activated carbon. Following this, zeolite-5A adsorbs trichloroethylene (TCE) from the air. Finally, activated carbon is employed for the purpose of adsorbing o-cresol from aqueous solutions. A study was done to estimate phase equilibria and interphase mass transfer rates. To find the kinetic mass-transfer coefficient (K) for gases, the phase coefficients for mass transfer in the fluid phase ( ) and the pore phase ( ) were added together. The estimation of (K) for liquid was performed using the mass transfer coefficient  for the solid phase and togather. The results suggest that the adsorption of acetic acid from air on activated carbon gives a good agreement with the Thomas model. The other sets of data demonstrate a disparity due to the underlying assumptions inherent in the Thomas model.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 16 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation Nurses Practice about Care of Children with Febrile Convulsion
...Show More Authors

Abstract

Objective(s): To evaluate the nurses` practices for children who diagnosed with febrile convulsion.

Methodology: A quantitative research, descriptive correlational design was used in this study, the study conducted on nurses who work in Al-Diwaniya Pediatrics Teaching Hospital-Iraq for Maternal and Children period from 12th September 2021 to 10th October 2022. A non- probability (convenience) sample has been applied to obtain the study goals. The study sample was (21) nurses who participate in the study. The study tool is composed of two parts: The first part is concerned with collection of nurses socio-demographic data obta

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Al–bahith Al–a'alami
Dictionaries in the News.. In the light of Semiotic analysis,
...Show More Authors

We refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Travel Medicine And Infectious Disease
Incidence of the COVID-19 in Iraq – Implications for travellers
...Show More Authors

View Publication
Scopus (20)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Design of L1 -Adaptive Controller for Single Axis Positioning Table
...Show More Authors

L1 adaptive controller has proven to provide fast adaptation with guaranteed transients in a large variety of systems. It is commonly used for controlling systems with uncertain time-varying unknown parameters. The effectiveness of  L1 adaptive controller for position control of single axis has been examined and compared with Model Reference Adaptive Controller (MRAC). The Linear servo motor is one of the main constituting elements of the x-y table which is mostly used in automation application. It is characterized by time-varying friction and disturbance.

    The tracking and steady state performances of both controllers have been assessed fo

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Properties of Fuzzy Compact Linear Operators on Fuzzy Normed Spaces
...Show More Authors

In this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Numerical Simulation of Thermal-Hydrodynamic Behavior within Solar Air Collector
...Show More Authors

Solar collectors, in general, are utilized to convert the solar energy into heat energy, where it is employed to generate electricity. The non-concentrating solar collector with a circular shape was adopted in the present study. Ambient air is heated under a translucent roof where buoyant air is drawn from outside periphery towards the collector center (tower base). The present study is aimed to predict and visualize the thermal-hydrodynamic behavior for airflow under inclined roof of the solar air collector, SAC. Three-dimensional of the SAC model using the re-normalization group, RNG, k−ε turbulence viscus model is simulated. The simulation was carried out by using ANSYS-FLUENT 14.5. The simulation

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
Eastern-european Journal Of Enterprise Technologies
Design and development of high-accuracy machine for wire bending
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref