Preferred Language
Articles
/
yRaE9YoBVTCNdQwC7rcY
Desulphurization of Simulated Oil Using SAPO-11 with CNT's as Adsorbent: A Kinetic Study
...Show More Authors

In this study, sulfur was removed from imitation oil using oxidative desulfurization process. Silicoaluminophosphate (SAPO-11) was prepared using the hydrothermal method with a concentration of carbon nanotubes (CNT) of 0% and 7.5% at 190 °C crystallization temperature. The final molar composition of the as-prepared SAPO-11 was Al2O3: 0.93P2O5: 0.414SiO2. 4% MO/SAPO-11 was prepared using impregnation methods. The produced SAPO-11 was described using X-ray diffraction (XRD) and Brunauer-Emmet-Teller (N2 adsorption–desorption isotherms). It was found that the addition of CNT increased the crystallinity of SAPO-11. The results showed that the surface area of SAPO-11 containing 7.5% CNT was 179.54 m2/g, and the pore volume was 0.317 cm3/g. However, the surface area of SAPO-11 containing 0% CNT was 125.311 m2/g, and pore volume was 0.275 cm3/g, while nanoparticles with an average particle diameter of 24.8 nm were obtained. Then, the prepared SAPO-11 was used in the oxidative desulfurization process. The oxidative desulfurization was studied using several factors affecting desulfurization efficiency, such as time (40, 60, 80, 100, and 120) min, amount of MO/SAPO-11 (0.3, 0.4, 0.5, 0.6, and 0.7) g/100 ml of simulated oil (100 ppm of dibenzothiophene), the amount of hydrogen peroxide (4ml) oxidizer/100 ml of simulated oil, and the temperature ranges from (40, 50, 60, 70, and 80 °C). The results showed that an increase in MO/SAPO-11 led to an increase in desulfurization. The best removal percentage for sulfur content was 92.79%, obtained at 70 °C and 0.6 g of MO/SAPO-11 containing 7.5% CNT, and the removal was 82.34% at 0% CNT and the same other conditions. While the equilibrium was achieved after 100 min. The results revealed that Freundlich's model described the adsorption of sulfur compounds better than Langmuir's, where the R2 of the Freundlich model was 0.9979 and the R2 of the Langmuir model was 0.9554.

Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Nuclear level density with proton resonance using Gaussian orthogonal ensemble theory
...Show More Authors

The Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.

A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin  misassignment .The present results show an acceptable agreement with the combinatorial method of level density.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Geological Journal
Geological Model for Mauddud Reservoir Khabaz Oil Field
...Show More Authors

The Mauddud reservoir, Khabaz oil field which is considered one of the main carbonate reservoirs in the north of Iraq. Recognizing carbonate reservoirs represents challenges to engineers because reservoirs almost tend to be tight and overall heterogeneous. The current study concerns with geological modeling of the reservoir is an oil-bearing with the original gas cap. The geological model is establishing for the reservoir by identifying the facies and evaluating the petrophysical properties of this complex reservoir, and calculate the amount of hydrocarbon. When completed the processing of data by IP interactive petrophysics software, and the permeability of a reservoir was calculated using the concept of hydraulic units then, there

... Show More
Crossref
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Biotreatment Technique to Treat Oil Wells Drilling Waste
...Show More Authors

The minimization, treatment and disposal of drilling wastes especially oily wastes are important environmental issues.

In this research two fungal isolates named Pleurotus ostreatus and Trichoderma harzianum were chosen carefully f or the purpose of biotreatment of oily drilled cuttings which resulting from  drilling oil wells using oil based muds (OBMs).

A relationship of total petroleum hydrocarbon degradation in oily drilled cuttings with time has been obtained. The results showed that Pleurotus ostreatus and Trichoderma harzianum can be considered hydrocarbon degrading microorganisms and the used biotreatment is cost effective process since most of the materials used in the cultivation and growth of the present f

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
New Viscosity Correlation for Different Iraqi Oil Fields
...Show More Authors

 

Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 14 2025
Journal Name
Journal Of Engineering
Stratified Water-Oil-Gas Flow Through Horizontal Pipes
...Show More Authors

View Publication
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Evaluation of Electrolytes Disturbances in Iraqi Chronic Myeloid Leukemia Patients treated with Nilotinib with Monitoring of Response by FISH Study
...Show More Authors

Chronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the presence Philadelphia chromosome (Ph) which was created by a reciprocal translocation between chromosomes 9 and 22 (t [9;22] [q34;q11]. The approval of the 2nd generation TKI ( Nilotinib) takes the treatment of CML patients into new erea with more efficiency and mild to moderate adverse effects. This study was aimed at evaluation of molecular cytogenetic response by (FISH) for Nilotinib in Iraqi patients with assessment for electrolytes disturbances of Nilotinb by measuring a panel of electrolyte (Na+, K+, Ca++, PO4--- and Mg++) , where thirty Iraqi patients with CML who have resistance or no response to Imatinib treatment, attending to Baghdad Teaching Ho

... Show More
View Publication Preview PDF
Crossref