The catalytic activity of faujasite type NaY catalysts prepared from local clay (kaolin) with different Si/Al ratio was studied using cumene cracking as a model for catalytic cracking process in the temperature range of 450-525° C, weight hourly space velocity (WHSV) of 5-20 h1, particle size ≤75μm and atmospheric pressure. The catalytic activity was investigated using experimental laboratory plant scale of fluidized bed reactor.
It was found that the cumene conversion increases with increasing temperature and decreasing WHSV. At 525° C and WHSV 5 h-1, the conversion was 42.36 and 35.43 mol% for catalyst with 3.54 Si/Al ratio and Catalyst with 5.75 Si/Al ratio, respectively, while at 450° C and at the same WHSV, the conversion was decreased to 29.15 and 21.86 mol% respectively, and the catalyst of 5.75 Si/Al ratio gave the higher cumene activity than the catalyst with 3.54 Si/Al ratio.
In the present study, ( Schiff's bases 6a - 6e) and (new amids derivatives 6f - 6j) have been synthesized . The glutaroyl chloride(2) has been prepared by the reacting of glutaric acid and thionyl chloride in presence of (DMF) . The new compound bis(4-formylphenyl) glutarate (3) has been Synthesized from reaction of one mole of glutaroyl chloride and two moles of 4-hydroxybenzaldehyde . Compound 4,4'-(glutaroylbis(oxy))dibenzoic acid (4) was Synthesized from one mole of glutaroyl chloride and two moles of 4-hydroxybenzoic acid, while compound bis(4-(chlorocarbonyl)phenyl) glutarate (5) was prepared from 4,4'-(glutaroylbis(oxy))dibenzoic acid and Thionyl chloride . Then Schiff's bases 6a - 6e that prepared
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreIn the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show MoreZ-scan has been utilized for studying the non-linear properties and optical limiting behaviors of the dye Copper Phthalocyanine thin films. The refractive index is negative, which indicates a self-defocusing behavior and non-linear absorption coefficient (
Out of a total of fifty samples, thirty-five isolates were identified as Serratia marcescens. Thesediverse clinical samples were collected over a three-month period, from October 2023 to December 2023, fromseveral hospitals in Baghdad, including Fatima Al-Zahraa Hospital, Al-Sader Hospital, Ibn Al-Balady Hospital,and Al-Imam Ali Hospital. The clinical samples primarily included urine from patients with urinary tractinfections (UTIs). All isolates were cultured on nutrient agar, MacConkey agar, and blood agar, and theiridentities were confirmed through biochemical testing and the Vitek 2 compact system. Based on phenotypicvirulence factors, the S. marcescens isolates showed varying positive patterns: 32 out of 35 (91.42%) forprotease
... Show MoreEighty five samples were taken from patients suffering from pneumonia. Seventy-eight isolates were diagnosed as following: Staphylococcus aureus (23), klebsiella pneumoniae (29), Streptococcus pneumoniae (15), Serratia sp. (4), Haemophilus influenzae (4) and Pseudomonas aeruginosa (3). The clinical isolates were tested for antibiotics sensitivity. They appeared highly resistance to penicillin G and Ampicillin at percentage 89.7 and 84.6% respectly while the results showed highly sensitivity to streptomycin at percentege of (12.8%). To study the antibacterial activity of Alium sativum, Eucalyptus microtheca leaves and Cydonia oblonga seeds extracts, five multi resistant strains were used by using agar well diffusion and disk methods at c
... Show More