The present study reports the effect of temperature and liquid hourly space velocity (LHSV) on the cumene cracking reaction rate and selectivity by using a laboratory continuous flow unit with fixed bed reactor operating at atmospheric pressure. The prepared HX zeolite was made from Iraqi kaolin with good crystallinity .The activity and selectivity of prepared HX-zeolite was compared with standard HY zeolite and HX zeolite catalysts in the temperature range of 673-823K and LHSV of 0.7-2.5 h-1 . It was found that the cumene conversion increases with increasing temperature and decreasing LHSV at 823K and LHSV of 0.7 h-1 the conversions 65.32, 42.88 and 59.42 mol% for HY, HX and prepared HX catalysts respectively and at LHSV of 2.5 h-1 and the same temperature the conversions decrease to 29.24, 12.53 and 22.89 mol%, respectively .It also found that the benzene yield increases with increasing temperature at 823K and LHSV of 0.7 h-1 the benzene yields were 58.79, 38.56 and 54.56 mol% for HY zeolite , HX zeolite and prepared HX zeolite, respectively and the selectivity to benzene is nearly constant over the studied temperatures range. The kinetics of cumene cracking ( the kinetics parametersrate constant )and activation energy are used in this study to characterize differences between various catalysts. The reaction was found to be first order with activation energy equal to 78.58 , 89.10 and 97.77 kJ/mol for HY, prepared HX and HX , respectively
Background: Silymarin is a polyphenolic flavonoid
derived from milk thistle (Silybum marianum) that has
anti-inflammatory, cytoprotective, anticarcinogenic
and antioxidant effects. It has been used medicinally
to treat liver disorders including acute and chronic
viral hepatitis, toxin/drug induced hepatitis, and
alcoholic liver disease.
Objective: To evaluate the antinociceptive effect of
silymarin in experimental animal model of pain.
Methods: The efficacy and dose response effect of
silymarin (125, 250, and 500mg/kg) were assessed
against control using tail flick test in mice as a model
of nociceptive pain. In this model, all doses of
silymarin were given intraperitoneally 15 min before
immersi
The objective of study is to investigate the effect of using of Whey – Extracted Soyamilk indifferent Proportions instead of Cow s milk on Standing Height of Muffin of 5.5 cm. was reached in the treatment C ( 50% Whey – Extracted Soyamilk ) as compared with a Control treatment A (0% Whey – Extracted Soyamilk) at which the Muffin height reached 4.8 cm. About the sensory evaluation , The results showed for the Flavour property , to a significant difference was found between the treatment A (0% whey – Extracted Soyamilk ) which got 6.2 degree as compared with the two treatments namely , D(75% Whey – Extracted Soyamilk) and E(100% Whey – Extracted Soyamilk) Which got 5.7 and 5.3 degree , respectively. For Ge
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreInduced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H2O2 concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique
<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More