In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 containing 7.5% CNT was 179.54 m2/g, and the pore volume was 0.317 cm3/g. However, the surface area of SAPO-11 containing 0% CNT was 125.311 m2/g, and pore volume was 0.275 cm3/g, while nanoparticles with an average particle diameter of 24.8 nm were obtained. Then, the prepared SAPO-11 was used in the oxidative desulfurization process. The oxidative desulfurization was studied using several factors affecting desulfurization efficiency, such as time (40, 60, 80, 100, and 120) min, amount of MO/SAPO-11 (0.3, 0.4, 0.5, 0.6, and 0.7) g/100 ml of simulated oil (100 ppm of dibenzothiophene), the amount of hydrogen peroxide (4ml) oxidizer/100 ml of simulated oil, and the temperature ranges from (40, 50, 60, 70, and 80 °C). The results showed that an increase in MO/SAPO-11 led to an increase in desulfurization. The best removal percentage for sulfur content was 92.79%, obtained at 70 °C and 0.6 g of MO/SAPO-11 containing 7.5% CNT, and the removal was 82.34% at 0% CNT and the same other conditions. While the equilibrium was achieved after 100 min. The results revealed that Freundlich's model described the adsorption of sulfur compounds better than Langmuir's, where the R2 of the Freundlich model was 0.9979 and the R2 of the Langmuir model was 0.9554.
Modern agriculture is challenged by soil degradation, nutrient depletion, plant diseases, and excessive dependence on chemical fertilizers and pesticides. By examining different strains of Pantoea, the study highlights their role in promoting plant growth, improving their tolerance to stress, reducing reliance on synthetic agricultural inputs, and contributing to more sustainable and environmentally friendly agricultural practices. Using a combination of practical qualitative methods and reliable quantitative data, the research gathers extensive information on how these microbes impact various crops and key soil health indicators. The improvements in plant growth statistics and nutrient levels are often quite astonishing. The result
... Show MoreThis paper aims at exploring the impact of the Iraq-Iran war in the poetry of Adnan Al-Sayegh. Al-Sayegh participation in this war makes him a first hand witness to the atrocities of the trenches and fight in the first lines. This war did not only change his life and world view for good, it changes the nature of his poetry as well. As aresult, war becomes a central issue not only in the poetry Al-Sayegh wrote in the 1980s and 1990s Iraq, but also in the exile.
Key Words: War, Al-Sayegh, Poetry.
The study evaluated the recovery performance of any home herbs group as first aid in some emergency cases. The study involved 10 items of herbs (chamomile, black pepper, cloves, cinnamon, and anise) which used in acute cases such as cold, colic, inflammation of the intestine and tonsillitis, and (hibiscus, catnip, dried lime, cress seed, and ginger) were used for chronic cases such as hypertension, cardiovascular disease, and arthritis. The results showed the herbs had healing power and efficiency in the primary remedy for the above-mentioned diseases. The side effects, the contradictions, and the overdoses of these substances were discussed. It was concluded that home herbs could be used for treatment in emergency cases until moder
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreKE Sharquie, AA Noaimi, AF Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 11
A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the