
In this paper, a mathematical model for the oxidative desulfurization of kerosene had been developed. The mathematical model and simulation process is a very important process due to it provides a better understanding of a real process. The mathematical model in this study was based on experimental results which were taken from literature to calculate the optimal kinetic parameters where simulation and optimization were conducted using gPROMS software. The optimal kinetic parameters were Activation energy 18.63958 kJ/mol, Pre-exponential factor 2201.34 (wt)-0.76636. min-1 and the reaction order 1.76636. These optimal kinetic parameters were used to find the optimal reaction conditions which
... Show MoreIncivility in nursing education can negatively affect the academic achievement. As there is no tool in Arabic to assess incivility among nursing students, there is a need for a valid and reliable tool.
This study aimed to investigate the psychometric properties of the Arabic version of the Incivility in Nursing Education- Revised (INE-R) survey.
Th
The river water salinity is a major concern in many countries, and salinity can be expressed as total dissolved solids. So, the water salinity impact of the river is one of the major factors effects of water quality. Tigris river water salinity increase with streamline and time due to the decrease in the river flow and dam construction from neighboring countries. The major objective of this research to developed salinity model to study the change of salinity and its impact on the Al-Karkh, Sharq Dijla, Al-Karama, Al-Wathba, Al-Dora, and Al-Wihda water treatment plant along Tigris River in Baghdad city using artificial neural network model (ANN). The parameter used in a model built is (Turbidity, Ec, T.s, S.s, and TDS in)
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show MoreThis research presents a study for precipitating phosphorus (as phosphate ion) from simulated wastewater (5ppm initial concentration of phosphorus) using calcium hydroxide Ca(OH)2 solution. The removal of phosphorus by Ca (OH)2 solution is expected to be very effective since the chemical reaction is of acid-base type but Ca(OH)2 forms complex compound with phosphate ions called. Hydroxyapatite Ca5 (PO4)3OH. hydroxyapatite is slightly soluble in water. This research was directed towards sustainable elements as phosphorus. Kinetics of the dissolution reaction of hydroxyapatite was investigated to find the best factors to recover phosphorus. The effect of con
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe aims of the lecture should be clearly defmed. These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate. On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate fonnat.
Lectures are still a common teaching methOd in both undergraduate and postgraduak medical education. Properly done, the lectwe is a creative and personal work by the teachll:l modeled upon his intellectual scaffolding. Few other fonns o