This work was conducted to study the recovery of catalyst and desirable components from tar formed in phenol production unit and more particularly relates to such a method whereby better recovery of copper salts, phenol, benzoic acid and benzoate salts from tar by aqueous acid solution was accomplished.
The effect of solvent type, solvent concentration (5, 10, 15, 20, 25 and 30 wt%), agitation speed (100, 200, 300 and 400 rpm), agitation time (5, 10, 15, 20 and 25 min), temperature (90, 100, 110, 120, 130 and 140 oC) , phase ratio (1/1, 2/1, 3/1, 4/1 and 5/1) and number of extraction (1, 2, 3, 4, and 5) were examined in order to increase the catalyst and desirable components extraction.
Four types of solvent were used; hydrochloric
Trickle irrigation is one of the most conservative irrigation techniques since it implies supplying water directly on the soil through emitters. Emitters dissipate energy of water at the end of the trickle irrigation system and provide water at emission points. The area wetted by an emitter depends upon the discharge of emitter, soil texture, initial soil water content, and soil permeability. The objectives of this research were to predict water distribution profiles through different soils for different conditions and quantify the distribution profiles in terms of main characteristics of soil and emitter. The wetting patterns were simulated at the end of each hour for a total time of application of 12 hrs, emitter disch
... Show MoreThe extraction of iron from aqueous chloride media in presence of aluminum was studied at different kinds of extractants(cyclohexanone, tributyl phosphate, diethyl ketone), different values of normality (pH of the feed solution), agitation time, agitation speed, operating temperature, phase ratio (O/A), iron concentration in the feed, and extractant concentration]. The stripping of iron from organic solutions was also studied at different values of normality (pH of the strip solution) and phase ratio (A/O). Atomic absorption spectrophotometer was used to measure the concentration of iron and aluminum in the aqueous phase throughout the experiments.The best values of extraction coefficient and stripping coefficient are obtained under the
... Show MoreThirty uropathogenic E. coli isolates were isolated from hospitalized and non hospitalized patients, complaining of urinary tract infections, of Al-Kadhymia Teaching Hospital and subjected to tRNA extraction. A method of tRNA extraction was modified by adding sodium dodecyl sulfate (SDS) instead of urea. Polyacrylamide gel electrophoresis and two methods of staining, ethidium bromide staining and silver staining, as well as spectrophotometric detection were used.
Over the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here w
... Show MoreEvolution has become a feature of this era because of the speed that makes it open multiple horizons and many to identify everything that is new in different areas and also characterized by the competitive position of emotional attitudes changing depending on the positions of winning and defeat, and the use of training methods are the most important pillars of the game of wrestling, The methods contribute to raising the level of the wrestler and refining his physical and skill potential. The problem of the research is that the shooting exercises from above the chest are very important in Roman wrestling and can be terminated by the player. Through very personal interviews for coaches and concluded that there is a weakness in the level of fl
... Show MoreThis study aims to identify the teaching problems that teachers of students with intellectual disabilities face, in addition to exploring the solutions suggested by them in order to overcome such problems or challenges. The researchers used a qualitative approach in order to understand the teachers' perceptions about these problems in a more in-depth way. The interview tools (in-depth and semi-structured interviews) were used to collect data from (3) female teachers from special education programs in the Asir region. The results revealed a number of themes including problems related to students, teachers and the teaching methods they use, curricula, school environment, and school administration. Moreover, the results indicated that famil
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More