In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin
The ion-pair formation method has been applied for the spectrophotometric determination of Cimetidine and Erythromycin ethylsuccinate, in bulk samples and in dosage form. The methods are accurate, simple, rapid, inexpensive and sensitive depending on the extraction of the formed ion-pair with brompthymol blue (BTB) as a chromogenic reagent in chloroform, use phthalate buffer of pH 5.5 and 4.0 for Cimetidine and Erythromycin ethylsuccinate respectively. The formed complexes show absorbance maxima at 427.5 nm and 414.5 nm for Cimetidine and Erythromycin ethylsuccinate respectively against reagent blank. The calibration graphs are linear in the ranges of 0.5-15 µg.mL-1 with detection limit of 0.222 µg.mL-1 for
... Show MoreIn this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIn this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations
... Show More