Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


FACTORY TECHNOLOGIES AT HOME - SIMPLE RECIPES
Free library / Directory / Factory technology at home - simple recipes

Clarification of linseed oil. Simple recipes and tips

Factory technologies - simple recipes

Directory / Factory technology at home - simple recipes

Comments on the article Comments on the article

Here are some recipes clarification of linseed oil.

1st recipe

Clarification is carried out by heating, for which crude oil is kept at a temperature of 30 ° C for 275 minutes. The faster such heating is carried out, the faster and more perfectly the coagulation of protein substances will occur. This coagulation occurs best at 275-310°C. But, despite all of the above, it is better to heat the oil slowly until foaming stops. After heating, the oil is left to cool, and the precipitate, which has a light brown color, settles to the bottom. Then the oil can be drained or filtered. If heating is carried out in an iron cauldron, then the oil acquires a reddish color, similar to the color of drying oil; if it is heated in an aluminum cauldron, the result is a light yellow-amber oil.

2st recipe

A mixture of equal parts of crude oil and hot water is steamed for 1-2 hours. After that, the oil is allowed to settle, then the water will collect at the bottom of the vessel, the transparent oil will float to the top, and the sediment will take a middle position between water and oil. After 5 days, a transparent layer of oil is lowered into the boiler and heated for 2 hours to 110 ° C to remove the remaining water. It is recommended to add 1% sulfuric acid to the mixture of oil and water before passing steam. This method simultaneously bleaches the oil, which, moreover, clarifies much faster. You can also add a few more pounds of fuller or barite sulphate, which will drag the sediment to the bottom and thus shorten the clarification time. This sediment can be used to prepare putty, and the craftsmen who make it are happy to acquire these sediments. The oil processed by this method has a very light color.

3st recipe

Shake 250 parts of linseed oil in a glass flask with a solution of 5 parts of potassium permanganate to 125 parts of water, leave to stand for 24 hours in a warm place and then add 7,5 parts of crushed sodium sulphate, and after complete dissolution - 10 parts of hydrochloric acid. After the mixture has discolored with good stirring, the oil is washed with water, to which a little chalk has been added, until the reaction of the flowing water is no longer acidic; to free it from water, the oil is filtered through anhydrous Glauber's salt.

Author: Korolev V.A.

We recommend interesting articles Section Factory technology at home - simple recipes:

▪ liquid bronze

▪ Oranienburg soap

▪ Tin varnish

See other articles Section Factory technology at home - simple recipes.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

Machine for thinning flowers in gardens 02.05.2024

In modern agriculture, technological progress is developing aimed at increasing the efficiency of plant care processes. The innovative Florix flower thinning machine was presented in Italy, designed to optimize the harvesting stage. This tool is equipped with mobile arms, allowing it to be easily adapted to the needs of the garden. The operator can adjust the speed of the thin wires by controlling them from the tractor cab using a joystick. This approach significantly increases the efficiency of the flower thinning process, providing the possibility of individual adjustment to the specific conditions of the garden, as well as the variety and type of fruit grown in it. After testing the Florix machine for two years on various types of fruit, the results were very encouraging. Farmers such as Filiberto Montanari, who has used a Florix machine for several years, have reported a significant reduction in the time and labor required to thin flowers. ... >>

Advanced Infrared Microscope 02.05.2024

Microscopes play an important role in scientific research, allowing scientists to delve into structures and processes invisible to the eye. However, various microscopy methods have their limitations, and among them was the limitation of resolution when using the infrared range. But the latest achievements of Japanese researchers from the University of Tokyo open up new prospects for studying the microworld. Scientists from the University of Tokyo have unveiled a new microscope that will revolutionize the capabilities of infrared microscopy. This advanced instrument allows you to see the internal structures of living bacteria with amazing clarity on the nanometer scale. Typically, mid-infrared microscopes are limited by low resolution, but the latest development from Japanese researchers overcomes these limitations. According to scientists, the developed microscope allows creating images with a resolution of up to 120 nanometers, which is 30 times higher than the resolution of traditional microscopes. ... >>

Air trap for insects 01.05.2024

Agriculture is one of the key sectors of the economy, and pest control is an integral part of this process. A team of scientists from the Indian Council of Agricultural Research-Central Potato Research Institute (ICAR-CPRI), Shimla, has come up with an innovative solution to this problem - a wind-powered insect air trap. This device addresses the shortcomings of traditional pest control methods by providing real-time insect population data. The trap is powered entirely by wind energy, making it an environmentally friendly solution that requires no power. Its unique design allows monitoring of both harmful and beneficial insects, providing a complete overview of the population in any agricultural area. “By assessing target pests at the right time, we can take necessary measures to control both pests and diseases,” says Kapil ... >>

Random news from the Archive

Vulnerability of USB devices 09.08.2014

German experts have discovered a fundamental vulnerability in all USB devices. When a device is infected, the user will simply have to throw it away, since the malicious code will be located directly in the chip responsible for its operation. No antivirus can reach this controller.

Any USB device can become a hacker's tool: a mouse, a flash drive, a keyboard, an external hard drive, or even a smartphone connected via a USB interface. This is warned by Jakob Lell and Karsten Nohl, experts at the German consulting firm Security Research Labs.

According to experts, every USB peripheral includes a chip - an interface controller - that can be easily reflashed. There is no protection that could prevent this action.

After flashing the USB controller, an attacker can, for example, emulate a USB keyboard, then enter commands on behalf of the user and install malicious software, penetrate the network card in order to change the DNS so that all Internet traffic flows through the hacker's node, or launch a virus into the operating system right during the PC boot (provided that the compromised device is connected to it at that moment).

"To date, we do not have information about effective methods of protection against such attacks," - say Lel and Nol. The antivirus installed on the PC will never know that the controller firmware has been changed, because it simply does not have access to this chip. Firewalls that could block USB devices of a certain class do not yet exist. And even behavioral analysis technologies are not suitable in such a case, since emulation of another device will be perceived only as a device change by the user himself.

Experts believe that if the system is infected in this way, the problem will be very difficult to fix. Even reinstalling the OS will not help get rid of viruses, since they will be inside the controllers, and not on the hard drive with system files. The virus can also infect other devices that are connected to the PC via USB, such as a webcam or speaker system.

"After a PC is infected, all peripheral devices that are connected to it via a USB interface can never be trusted," the experts conclude.

At the Black Hat conference, which will be held in Las Vegas (USA), the researchers plan to present a report on the discovered new type of vulnerability.

Other interesting news:

▪ Toshiba processor for wearable electronics

▪ Tropics move to the Arctic

▪ Nanoparticles control immunity

▪ Transcend introduces copy-protected memory cards

▪ Microelectrodes help to find out the word made by a person

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ site section Clocks, timers, relays, load switches. Article selection

▪ article Stirling engine model. Tips for a modeler

▪ article Where is the lake that is teeming with jellyfish? Detailed answer

▪ article Paraglider Alpha-29. Personal transport

▪ article Phase meter on the OS. Encyclopedia of radio electronics and electrical engineering

▪ article Designation systems for semiconductor devices of foreign production. Encyclopedia of radio electronics and electrical engineering

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024