This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Zeolite 5A was prepared by ion exchange of zeolite 4A prepared at 90°C and 2N NaOH concentration with 1.5 N calcium chloride solution at 90 °C and 5 hours, the ion exchange percentage was 66.6%. The formation experiments included mixing the prepared powder of 5A zeolite with different percentages of kaolin clay, citric acid and tartaric acid to form an irregular shape of zeolite granules. Tartaric acid binder gives higher bulk crushing strength than that obtained by using citric acid binder with no significant difference in the surface area. 7.5 weight% tartaric acid binder has the higher bulk crushing strength 206 newton with surface area 267.4 m2/g. Kaolin clay binder with 15 weight% gives the highest surface area 356 m2/g with bulk crushing strength 123 newton, it was chose as the best binder for zeolite 5A. The prepared granules of 5A zeolite were used for the adsorption experiments of H2O, and H2S contaminants from LPG. Different flow rates of LPG (3, 4, and 5 liter/minute) were studied. It was found that H2O is the strongly adsorbed component and H2S is the weakly adsorbed component. The best flow rate in this work for H2O, and H2S adsorption is 5 liter/minute of LPG. The adsorption capacity for H2O was 7.547 g/g and for H2S was 1.734 g/g.
Moment invariants have wide applications in image recognition since they were proposed.
This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreIn the current study, haemoglobin analytes dissolved in a special buffer (KH2PO4(1M), K2HPO4(1M)) with pH of 7.4 were used to record absorption spectra measurements with a range of concentrations from (10-8 to 10-9) M and an absorption peak of 440nm using Broadband Cavity Enhanced Absorption Spectroscopy (BBCEAS) which is considered a simple, low cost, and robust setup. The principle work of this technique depends on the multiple reflections between the light source, which is represented by the Light Emitting Diode 3 W, and the detector, which is represented by the Avantes spectrophotomer. The optical cavity includes two high reflectivity ≥99% dielectric mirrors (dia
... Show MoreAbstract
This paper presents mechanical and electrical design, and implementation process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi
... Show MoreThe research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea
... Show MoreBased on a finite element analysis using Matlab coding, eigenvalue problem has been formulated and solved for the buckling analysis of non-prismatic columns. Different numbers of elements per column length have been used to assess the rate of convergence for the model. Then the proposed model has been used to determine the critical buckling load factor () for the idealized supported columns based on the comparison of their buckling loads with the corresponding hinge supported columns . Finally in this study the critical buckling factor () under end force (P) increases by about 3.71% with the tapered ratio increment of 10% for different end supported columns and the relationship between normalized critical load and slenderness ratio was g
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More