The synthesis of zeolite NaX from locally available kaolin has been studied. The operating conditions for zeolite NaX production from kaolin with good crystallinity were as follows; a gel formation step of metakaolin in alkaline medium in presence of additional silica to crystallize the zeolite was achieved at 60 oC for 1 hr,and with stirring. In ageing step of the reactants at room temperature for 5 days and crystallization step at 87±2 oC for 24 hr. The catalytic activity of catalyst prepared from local kaolin was studied by using cumene cracking as a model for catalytic cracking and compared with standard HY zeolite and HX zeolite catalysts. The activity test was carried out in a laboratory continuous flow unit with fixed bed reactor
... Show MoreThe synthesis of zeolite NaX from locally available kaolin has been studied. The operating conditions for zeolite NaX production from kaolin with good crystallinity were as follows; a gel formation step of metakaolin in alkaline medium in presence of additional silica to crystallize the zeolite was achieved at 60 oC for 1 hr,and with stirring. In ageing step of the reactants at room temperature for 5 days and crystallization step at 87±2 oC for 24 hr. The catalytic activity of catalyst prepared from local kaolin was studied by using cumene cracking as a model for catalytic cracking and compared with standard HY zeolite and HX zeolite catalysts. The activity test was carried out in a laboratory continuous flow unit with fixed bed re
... Show More<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show MoreThe effect of compound machine on wheat/ AlNoor cultivar was studied based on some technical indicators. were tested under three speeds ( 2.541, 3.433 and 4.091km.hr-1) and three tillage depths (14, 16 and 18cm). The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the 2.541km.hr-1 practical speed was significantly better than other two speed in all studied conditions. Except for the FC, which achieved the best results with the third speed 4.091 km.hr-1. mechanical parameters, plant growth parameters and yield and growth parameters. The 1
The focus of this work is on systematically understanding the effects of packing density of the sand grains on both the internal and bulk mechanical properties for strip footing interacting with granular soil. The studies are based on particle image velocimetry (PIV) method, coupled with a high resolution imaging camera. This provides valuable new insights on the evolution of slip planes at grain-scale under different fractions of the ultimate load. Furthermore, the PIV based results are compared with finite element method simulations in which the experimentally characterised parameters and constitutive behaviour are fed as an input, and a good level of agreements are obtained. The reported results would serve to the practicing engineers, r
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreThe present paper aims at evaluating the vailability quality and future horizons of potable water in the city of Shatra as a model. This is done in accordance with certain subjective and objective factors alongside the classification map of Shatra as a residential area. This system follows geographical studies specialized in urban construction. The problem of the present paper as well as the data approaching that problem have been chosen from the records of 2018. The researcher offered (919) questionnaire forms to be answered by a sample of dwellers in that area. Besides, the researcher also followed lab analysis of water samples collected from districts in the city of Shatra. GIS technology was also used to arrive at the real water shar
... Show MoreReverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG
... Show MoreResearch summary
Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:
The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.
All these manifestations and others require the nation's wise men
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More