Spent hydrodesulfurization (Co-Mo/γ-Al2O3) catalyst generally contains valuable metals like molybdenum (Mo), cobalt (Co), aluminium (Al) on a supporting material, such as γ-Al2O3. In the present study, a two stages alkali/acid leaching process was conducted to study leaching of cobalt, molybdenum and aluminium from Co-Mo/γ-Al2O3 catalyst. The acid leaching of spent catalyst, previously treated by alkali solution to remove molybdenum, yielded a solution rich in cobalt and aluminium.
This study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the
... Show More
In this work, calculation of pressure losses in circulating system for two drilling muds is evaluated in Noor oil field. Two types of drilling muds that were used for drilling section 12 1/4" and 8 3/4" which are Salt saturated mud and Ferro Chrome Lignosulfonate-Chrome Lignite mud. These calculations are based on field data that were gathered from the drilling site of well Noor-15, which are included, rheological data, flow data and specification of drill string. Based on the obtained results, the best rheological model that fit their data is the Herschel-Bulkley model according to correlation coefficient value for their two drilling mud. Also, the difference between the calculated pressure lo
... Show MoreThe bioequivalence of a single dose tablet containing 5 mg amlodipine as a test product in comparison to Norvasc® 5 mg tablet (Pfizer USA) as the reference product was studied. Both products were administered to twenty eight healthy male adult subjects applying a fasting, single-dose, two-treatment, two-period, two-sequence, randomized crossover design with two weeks washout period between dosing. Twenty blood samples were withdrawn from each subject over 144 hours period. Amlodipine concentrations were determined in plasma by a validated HPLC-MS/MS method. From the plasma concentration-time data of each individual, the pharmacokinetic parameters; Cmax, Tmax, AUC0-t, AUC0-
Investigations made and soil samples brought from 14 sites in different areas, including Abu Ghraib and Al Anbar. Tests and measurements made in the Microbiology Laboratory at the College of Agriculture, University of Anbar. Department of Soil Sciences and water Resources, in order to isolate bio-fertilizers and test isolates fixing nitrogen in atmosphere and solvents for phosphorous compounds efficiency. The experiment included isolating and diagnosis of bacteria from rhizosphere soils of different plants that were brought from different agricultural areas, 74 isolates obtained by soils alleviation, and then the bio-chemical morphological and microscopic characteristics of these soils studied. The results showed that the most abundant and
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show More