Oxidation of sulfur compounds in fuel followed by an adsorption process were studied using two modes of operation, batch mode and continuous mode (fixed bed). In batch experiment oxidation process of kerosene with sulfur content 2360 ppm was achieved to study the effect of amount of hydrogen peroxide(2.5, 4, 6 and 10) ml at different temperature(40, 60 and 70)°C. Also the effect of amount acetic acid was studied at the optimal conditions of the oxidation step(4ml H2O2 and 60 °C).Besides, the role of acetic acid different temperatures(40, 60, 70) °C and 4ml H2O2, effect of reaction time(5, 30, 60, 120, 300) minutes at temperatures(40,60) °C, 4ml H2O2 and 1 mlHAC)&
... Show MoreWater hyacinth (Eichhornia crassipes) is a free-floating plant, growing plentifully in the tropical water bodies. It is being speculated that the large biomass can be used in wastewater treatment, heavy steel and dye remediation, as a substrate for bioethanol and biogas production, electrical energy generation, industrial uses, human food and antioxidants, medicines, feed, agriculture, and sustainable improvement. In this work, the adsorption of Congo Red (CR) from aqueous solution onto EC biomass was investigated through a series of batch experiments. The effects of operating parameters such as pH (3-9), dosage (0.1-0.9 g. /100 ml), agitated velocity (100-300), size particle (88-353μm), temperature (10-50˚C), initial dye
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreBackground: Powerlifters and bodybuilders use anabolic androgenic steroids (AAS) especially – as many as 55 percent of elite powerlifters admitted using these agents. In contrast to numerous documented toxic and hormonal effects of AAS their impact on the structure and function of the left ventricular (LV) was not yet fully understood.
This paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio
Using remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST
Array antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More