This work deals with the production of light fuel cuts of (gasoline, kerosene and gas oil) by catalytic cracking treatment of secondary product mater (heavy vacuum gas oil) which was produced from the vacuum distillation unit in any petroleum refinery. The objective of this research was to study the effect of the catalyst -to- oil ratio parameter on catalytic cracking process of heavy vacuum gas oil feed at constant temperature (450 °C). The first step of this treatment was, catalytic cracking of this material by constructed batch reactor occupied with auxiliary control devices, at selective range of the catalyst –to- oil ratio parameter ( 2, 2.5, 3 and 3.5) respectively. The conversion of heavy vacuum gas oil which was obtained, reaches to (50, 70, 75 and 80) % for (2, 2.5, 3 and 3.5 catalysts -to- oil ratio parameter respectively. The second step for this study was distillation of this cracking heavy vacuum gas oil liquid by atmospheric distillation device for these several catalyst -to- oil ratio parameter, according to obtained light fuel cuts (gasoline, kerosene and gas oil). The percentage volume of light fractions at various COR are (7, 25 and 18) for COR 2, (10, 20 and 40) for COR 2.5, (10, 30 and 35) for COR 3 and (15, 30 and 35) for COR 3.5 which separates according to its boiling point. The light cuts were distilled by atmospheric distillation device in order to obtained distillation curve. The third step was study the major physical and chemical properties for feed (heavy vacuum gas oil) and catalytic cracking liquid of HVGO at various COR with its light fuel fractions, the results refers to acceptable properties compared with other commercial properties.
Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreContinuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll
... Show MoreThe present study was undertaken to study the effect of apigenin and luteolin on physiological and histological changes in rats treated with cytarabine drugs. Thirty-five albino healthy male adult rats with equal age weighing 250 -300g were enrolled. Rats were randomly divided into seven groups according to the treatment. Group “1” was treated with normal saline and served as the control group. Groups “2,3 and 4” received cytarabine, apigenin, and luteolin respectively, while groups 5, 6, and 7 received a combination of “apigenin + cytarabine”, “luteolin + cytarabine”, and “apigenin + luteolin + cytarabine”, respectively. After one week of treatment, all seven groups of rats were
... Show MoreSouth Sudan is known by its tribal and racial variation .Tribal Perception represents the
procedure of dealings in Southern society .And that what make Sudan as a stable country that
suffer from divisions . Everybody wants to rule in spite of his inability and un qualification
which enables the establishment of an urbanized country .the frustration of the state in
handling the interior variety on religious, tribal and racial basis and contracting national
ideality in spared by shared ingredients between gathered groups in one state, all these reasons
make it hard to create a united national identity which is able to unite atheist and religious
parties together. Due to this ,the study is established to clarify the nat
This study was set out to investigate factors affecting labor productivity on construction in the north of Iraq (Kurdistan) and to rank all the factors based on engineers, contractors, and designer’s opinions. 76 factors were analyzed based on previous literature and a pilot study. Next, by using online Google Form, a questionnaire form was created and sent to people who have experience in the construction industry. Afterward, the questionnaire form was sent to targeted people by email and social media apps. Factors were divided into nine groups “Management, Technical and Technology, Human and Workforce, Leadership, Motivation, Safety, Time, Material and Equipment, and External”. However, 202 respondents participated in this study,
... Show MoreThe present paper includes a study of color variation in Iraqi Collared dove Streptopelia decaocto. Three different populations have been recognized: the southern population which belongs to the Indian race, the northern population to the Eurasian race; the dark and light color variation occurs in the Baghdad population because of hybridisation between the two races, found infected with two cestodes, Raillietina echinobothrida found in most of our specimens, while the dark face found beside R. echinobothrida infected with Idiogenes sp. getting it probably from vertebrate sources. We believe that most of the Baghdad population was intermediate between north and south races.
... Show MoreAbstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration r
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More