The esterification of oleic acid with 2-ethylhexanol in presence of sulfuric acid as homogeneous catalyst was investigated in this work to produce 2-ethylhexyl oleate (biodiesel) by using semi batch reactive distillation. The effect of reaction temperature (100 to 130°C), 2-ethylhexanol:oleic acid molar ratio (1:1 to 1:3) and catalysts concentration (0.2 to 1wt%) were studied. Higher conversion of 97% was achieved with operating conditions of reaction temperature of 130°C, molar ratio of free fatty acid to alcohol of 1:2 and catalyst concentration of 1wt%. A simulation was adopted from basic principles of the reactive distillation using MATLAB to describe the process. Good agreement was achieved.
Activated carbon (AC) is a highly important adsorbent material, as it is a solid form of pure carbon that boasts a porous structure and a large surface area, making it effective for capturing pollutants. Thanks to its exceptional features, AC is widely used for purifying water that is contaminated with odors and removing dyes in a cost-effective manner. A variety of carbonic materials have been employed to prepare AC, and this study aimed to evaluate the suitability of utilizing waste mango and avocado seeds for this purpose, followed by testing their efficacy in removing dye from aqueous solutions. The results indicate that using waste mango and avocado as AC is technically feasible, achieving dye removal percentages of 98% and 93%,
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.
The research is assigned to sixth year primary school pupils- Baghdad –the 2nd karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:
- The pupils of sixth year primary school characterized by Moral Intelligence.
- The
This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreThis research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at
... Show More