Preferred Language
Articles
/
XRZ7JIcBVTCNdQwCrDpy
THE EFFECT OF OPERATING CONDITION FOR CUMENE CRACKING ON THE PERFORMANCE OF PREPARED HX - ZEOLITE CATALYST
...Show More Authors

The present study reports the effect of temperature and liquid hourly space velocity (LHSV) on the cumene cracking reaction rate and selectivity by using a laboratory continuous flow unit with fixed bed reactor operating at atmospheric pressure. The prepared HX zeolite was made from Iraqi kaolin with good crystallinity .The activity and selectivity of prepared HX-zeolite was compared with standard HY zeolite and HX zeolite catalysts in the temperature range of 673-823K and LHSV of 0.7-2.5 h-1 . It was found that the cumene conversion increases with increasing temperature and decreasing LHSV at 823K and LHSV of 0.7 h-1 the conversions 65.32, 42.88 and 59.42 mol% for HY, HX and prepared HX catalysts respectively and at LHSV of 2.5 h-1 and the same temperature the conversions decrease to 29.24, 12.53 and 22.89 mol%, respectively .It also found that the benzene yield increases with increasing temperature at 823K and LHSV of 0.7 h-1 the benzene yields were 58.79, 38.56 and 54.56 mol% for HY zeolite , HX zeolite and prepared HX zeolite, respectively and the selectivity to benzene is nearly constant over the studied temperatures range. The kinetics of cumene cracking ( the kinetics parametersrate constant )and activation energy are used in this study to characterize differences between various catalysts. The reaction was found to be first order with activation energy equal to 78.58 , 89.10 and 97.77 kJ/mol for HY, prepared HX and HX , respectively

Publication Date
Tue Jun 17 2025
Journal Name
Baghdad Science Journal
Utilizing an Atomic Force Microscopy with Continuous Flow Injection Analysis using NAG-4(sources)x3 with Three Solar Cells (NAG-4SX3-3D) Analyzer for Studying the Surface Morphology of the Precipitate of the Cyproheptadine-HCl and Loratadine
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Antinociceptive Effect of Silymarin in Experimental Animals
...Show More Authors

Background: Silymarin is a polyphenolic flavonoid
derived from milk thistle (Silybum marianum) that has
anti-inflammatory, cytoprotective, anticarcinogenic
and antioxidant effects. It has been used medicinally
to treat liver disorders including acute and chronic
viral hepatitis, toxin/drug induced hepatitis, and
alcoholic liver disease.
Objective: To evaluate the antinociceptive effect of
silymarin in experimental animal model of pain.
Methods: The efficacy and dose response effect of
silymarin (125, 250, and 500mg/kg) were assessed
against control using tail flick test in mice as a model
of nociceptive pain. In this model, all doses of
silymarin were given intraperitoneally 15 min before
immersi

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
EFFECT OF REPLACING COW MILK WITH WHEY
...Show More Authors

The objective of study is to investigate the effect of using of Whey – Extracted Soyamilk indifferent Proportions instead of Cow s milk on Standing Height of Muffin of 5.5 cm. was reached in the treatment C ( 50% Whey – Extracted Soyamilk ) as compared with a Control treatment A (0% Whey – Extracted Soyamilk) at which the Muffin height reached 4.8 cm. About the sensory evaluation , The results showed for the Flavour property , to a significant difference was found between the treatment A (0% whey – Extracted Soyamilk ) which got 6.2 degree as compared with the two treatments namely , D(75% Whey – Extracted Soyamilk) and E(100% Whey – Extracted Soyamilk) Which got 5.7 and 5.3 degree , respectively. For Ge

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
An Analytical Study for Urban Gentrification on Local Urban Centers
...Show More Authors

The urban Gentrification  is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Jun 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Review on Induced Electro-Fenton Process for Wastewater Treatment
...Show More Authors
Abstract<p>Induced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H<sub>2</sub>O<sub>2</sub> concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science &amp; Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref