In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 containing 7.5% CNT was 179.54 m2/g, and the pore volume was 0.317 cm3/g. However, the surface area of SAPO-11 containing 0% CNT was 125.311 m2/g, and pore volume was 0.275 cm3/g, while nanoparticles with an average particle diameter of 24.8 nm were obtained. Then, the prepared SAPO-11 was used in the oxidative desulfurization process. The oxidative desulfurization was studied using several factors affecting desulfurization efficiency, such as time (40, 60, 80, 100, and 120) min, amount of MO/SAPO-11 (0.3, 0.4, 0.5, 0.6, and 0.7) g/100 ml of simulated oil (100 ppm of dibenzothiophene), the amount of hydrogen peroxide (4ml) oxidizer/100 ml of simulated oil, and the temperature ranges from (40, 50, 60, 70, and 80 °C). The results showed that an increase in MO/SAPO-11 led to an increase in desulfurization. The best removal percentage for sulfur content was 92.79%, obtained at 70 °C and 0.6 g of MO/SAPO-11 containing 7.5% CNT, and the removal was 82.34% at 0% CNT and the same other conditions. While the equilibrium was achieved after 100 min. The results revealed that Freundlich's model described the adsorption of sulfur compounds better than Langmuir's, where the R2 of the Freundlich model was 0.9979 and the R2 of the Langmuir model was 0.9554.
The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
Asthma is a chronic inflammatory disorder of the airways in which many cells and cellular elements play a role. The treatment guidelines recommend theuse of a second controller drug in addition to medium doses of inhaled corticosteroids (ICSs) rather than the use of high doses ICS alone in the treatment of moderate-severe persistent asthma. This study was conducted to compare the clinical efficacy and safety of three treatment regimens in Iraqi patients with moderate-severe persistent asthma.The study included three groups; each group included 15 patients. Patients were administered beclomethasone inhaler alone 1500-2000 μg/day, beclomethasone inhaler 750-1000 μg/day plus oral controlled release aminophylline tablets 450 mg/day or
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThere are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Optical Mark Recognition (OMR) is an important technology for applications that require speedy, high-accuracy processing of a huge volume of hand-filled forms. The aim of this technology is to reduce manual work, human effort, high accuracy in assessment, and minimize time for evaluation answer sheets. This paper proposed OMR by using Modify Bidirectional Associative Memory (MBAM), MBAM has two phases (learning and analysis phases), it will learn on the answer sheets that contain the correct answers by giving its own code that represents the number of correct answers, then detection marks from answer sheets by using analysis phase. This proposal will be able to detect no selection or select more than one choice, in addition, using M
... Show Morethirty adult NewZealand rabbits used in this study, they were divided in to two groups (control and treaded with Helium — Neon laser). A square skin flap done on the medial aspect of the auricle of both sides, a square piece of cartilage incised, pealed out from each auricle and fixed in the site of the other, then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated using a Helium —Neon laser with (5mw) power for (10 days) began after the operation directly, (3 rabbits) from each group used for collection of specimens for histopathological examination at the weeks (1,2,3,4, & 6) weeks post the operation .The results revealed Early invasion of the matrix with elastic fibers which continue to t
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreMode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re
Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show More