This work deals with the production of light fuel cuts of (gasoline, kerosene and gas oil) by catalytic cracking treatment of secondary product mater (heavy vacuum gas oil) which was produced from the vacuum distillation unit in any petroleum refinery. The objective of this research was to study the effect of the catalyst -to- oil ratio parameter on catalytic cracking process of heavy vacuum gas oil feed at constant temperature (450 °C). The first step of this treatment was, catalytic cracking of this material by constructed batch reactor occupied with auxiliary control devices, at selective range of the catalyst –to- oil ratio parameter ( 2, 2.5, 3 and 3.5) respectively. The conversion of heavy vacuum gas oil which was obtained, reaches to (50, 70, 75 and 80) % for (2, 2.5, 3 and 3.5 catalysts -to- oil ratio parameter respectively. The second step for this study was distillation of this cracking heavy vacuum gas oil liquid by atmospheric distillation device for these several catalyst -to- oil ratio parameter, according to obtained light fuel cuts (gasoline, kerosene and gas oil). The percentage volume of light fractions at various COR are (7, 25 and 18) for COR 2, (10, 20 and 40) for COR 2.5, (10, 30 and 35) for COR 3 and (15, 30 and 35) for COR 3.5 which separates according to its boiling point. The light cuts were distilled by atmospheric distillation device in order to obtained distillation curve. The third step was study the major physical and chemical properties for feed (heavy vacuum gas oil) and catalytic cracking liquid of HVGO at various COR with its light fuel fractions, the results refers to acceptable properties compared with other commercial properties.
A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThe present study has examined the spatiotemporal varieties of the demographics of the Shatt Al-Arab River fishes and their relation to some ecological components. The aim is to forecast these groups in the unexplored parts of the waterway with an emphasis on environmental indices of diversity. Three sites in the river were selected as an observation and study of these species, which lasted from March 2019 to February 2020, the study dealt with factors affecting fishes, as Water Temperature (WT), Dissolved Oxygen (DO), Potential Hydrogen Ion (pH), Salinity (Sal), and Transparency (Tra). Gill nets, cast nets, hooks, and hand nets were adopted to collecting fish. The results indicated that the fish population comprises 60 species represent
... Show MoreABSTRACT : Bacillus cereus and Pseudomonas aeruginosa is the ability to produce a wide antimicrobial active compounds (Bacillin and S-Pyocin) against pathogenic microorganism. In vitro assay with the antagonists of both crude bacteriocin and partial by precipitation 75% ammonium sulfate showed that the effectively inhibited growth of the following (Candida kefyer and Fusarium spp) and Propionibacterium acnes. The results showed the inhibition zone of reached Bacillin (9-13 mm), while Pyocin (13 - 16mm) in solid medium.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe fish assemblage structure in Al-Huwaizah marsh, southern of Iraq was assessed. Fish samples collected monthly by different fishing means from period December 2017 to November 2018. A total of 28959 individual of fish belonging to 9 families and 19 species were collected, 11 of them of native species and 8 of alien
species. The numerical dominance index value (D3) of the highest three abundant species comprised 74.26% of the total fish caught, included Planiliza abu (Al-Keshny) 38.2% ; Coptodon zilli (Tilapia red abdomen) 29.41% and Carassius auratus (Prussian carp) 6.65%. The total weight of fish caught 2,190,680 tan, highest weight 312,242kg achieved in July, while lowest weight 41,590 kg found in&nb
This survey investigates the thermal evaporation of Ag2Se on glass substrates at various thermal
annealing temperatures (300, 348, 398, and 448) °K. To ascertain the effect of annealing
temperature on the structural, surface morphology, and optical properties of Ag2Se films,
investigations and research were carried out. The crystal structure of the film was described by Xray diffraction and other methods.The physical structure and characteristics of the Ag2Se thin films
were examined using X-ray and atomic force microscopy (AFM) based techniques. The Ag2Se
films surface morphology was examined by AFM techniques; the investigation gave average
diameter, surface roughness, and grain size mutation value
The aim of the study was to study the implications of the strategic direction on organizational performance. The research was carried out in the Iraqi Ministry of Defense / Inspector General's Office for the purpose of identifying the nature of the relationship and the impact between the two variables. A sample of 60 people managers, department managers and directorates was targeted.
The researcher tried to test hypotheses in the first chapter, which was devoted to the methodology of research and previous studies and found the following: (1) validity of the first hypothesis of the existence of a relationship of positive significance of the strategic direction in its sub-dimensions with organizational perf
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreThis research has been performed on the vegetative parts of the
Horsetail Equisetum arvense L. v.ilich grows naturally in Haj Umran , north of Iraq , to determine and estimate some active chemical compounds , besides studyi ng their inhi bitory effe(;tS upon some urinary tracts infections (UTI) bacteria through the
investigation on the inhibitory effects of water and ethanolic extracts of this plant .
The results revealed presr.:nr.:t: of some active chemical compounds such as: tannins, saponins, resins,
... Show MoreIn this numerical study a detailed evaluation of the heat transfer characteristics and flow structure in a laminar and turbulent flow through a rectangular channel containing built-in of different type vortex generator has been a accomplished in a range of Reynolds number between 500 and 100,000.A modified version of ESCEAT code has been used to solve Navier-Stokes and energy equations. The purpose of this paper is to present numerical comparisons in terms of temperature, Nusselt number and flow patterns on several configurations of longitudinal vortex generator including new five cases. The structures of heat and flow were studied, using iso-contours of velocity components, vortices, temperature and Nusselt n
... Show More