This research presents a new study in reactive distillation by adopting a consecutive reaction . The adopted consecutive reaction was the saponification reaction of diethyl adipate with NaOH solution. The saponification reaction occurs in two steps. The distillation process had the role of withdrawing the intermediate product i.e. monoethyl adipate from the reacting mixture before the second conversion to disodium adipate occurred. It was found that monoethyl adipate appeared successfully in the distillate liquid. The percentage conversion from di-ester to monoester was greatly enhanced (reaching 86%) relative to only 15.3% for the case of reaction without distillation .This means 5 times enhancement . The presence of two layers in both the distillate and residual liquids was noticed ,the upper (water) layer and the lower (ester) layer. However, water layer was dominant in the distillate .The percentage excess of NaOH solution was calculated with respect to the concentration of monoester (9%-79%) and it was found that increasing the concentration of NaOH solution( until 40%) led to increase in the percentage conversion to monoester. It also led to get a pure monoester in the distillate and made the residual liquid appear as one layer. Maximum conversion had been occurred in the rang (40%-60%). After 60% the percentage conversion lowered noticeably
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
Nanoparticles of humic acid and iron oxide were impregnated on the inert sand to produce sorbent for treating groundwater contained of cadmium and copper ions by technology of permeable reactive barrier (PRB). Sewage sludge was the source of the humic acid to prepare the coated sand by humic acid—iron oxide (CSHAIO) sorbent; so, this work is consistent with sustainable development. For 10 mg/L metal concentration, batch tests at speed of 200 rpm signified that the removal efficiencies are greater than 90% at sorbent dosage 0.25 g/ 50 mL, pH 6 and contact time 1 h. The kinetic data was well described by the Pseudo first-order model indicating that physicosorption is the predominant mechanism. The maximum adsorption capacities (qmax) were c
... Show MoreIn this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
Background: While two-thirds of breast cancers express hormone receptors for either estrogen (ER) and/or progesterone (PR) , genetically altered PI3K pathway was found in more than 70% of ER-positive breast cancers.An aberrant activity of cyclin-dependent kinase 1 (CDK1) in a wide variety of human cancers has selectively constituted an attractive pharmacological targets in MYC-dependent human breast cancer cells.
Aim of the study: Role of p110-beta as well as and CDK 1 in the pathogenesis of subset of breast cancers and contribution in their carcinogenesis.
Type of the study: is a retrospective study
Methods: This retr
... Show MoreObjective (s): To determine factors associated with the pregnancy complications (Maternal age, education,
obstetrical history, gravidity, birth space interval, and smoking).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was (non probability convenient sample) which included (550) pregnant women. The
study started from 1st April 2014 to 1
st of April 2015. The data was collected by direct interview using
special questionnaire to obtain socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 4.39 years, 57.8% were housewives, the
sample included 103 premature uterine contractions, 98 pregnancy induce
It must be emphasized that media is amongst human studies fusing older and more recent sciences together, and that its disclosures are the physics of the new communication. Michio Kaku, a theoretical physicist, in his book “ Visions”, confirms this fact when he says :” As a research physicist, I believe that physicists have been particularly successful at predicting the broad outlines of the future .Professionally, I work in one of the most fundamental areas of physics, the quest to complete Einstein's dream of a "theory of everything." As a result, I am constantly reminded of the ways in which quantum physics touches many of the key discoveries that shaped the twentieth century. “ He then got to the fact that the physical disclo
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreHe mentioned in this article the main types of corruption, which are political, moral, financial and administrative. Others may add other types of corruption, such as religious, scientific, media, informational and statistical corruption. At the global level, the focus is largely on financial corruption, although other types of corruption are no less bad than it. Financial corruption can be defined as all financial deviations in violation of general laws or the provisions of regulations, legislation, and procedures regulating the work of the state, private institutions and individuals and applied in state institutions and the private sector in general and inconsistent with the controls and instructions of financial control.
In th
... Show More