Mechanistic Study of Wettability Alteration of Carbonate Rocks Using New Quaternary Ammonium Surfactants
...Show More Authors
This paper presents seven modified Adomian Decomposition Method (ADM) techniques for efficiently solving initial value problems, especially those involving non-homogeneous and nonlinear differential equations. While the classical ADM is effective for linear homogeneous cases, it has difficulties solving more complex problems. The proposed modifications—from MADM1 to MLADM—include Maclaurin and Taylor expansions, Laplace transforms, and single-step iterations.• These modifications enhance convergence, reduce complexity, and improve accuracy.• Each method offers specific advantages, such as accelerating convergence (MADM2, RADM4), simplifying computation (TSADM5), and achieving higher accuracy (MLADM).• Numerical examples confirm th
... Show MoreTwo specie's of terrnitls are described as new to science from Iraq Amitermes corpnlentus sp. n. and Anacanthotermes savvensis sp. n., with two figures.
A new Species of the Cerambycinae belonging to the genus Hesperophanes was found new to the fauna of Iraq and Science. H. testaceus was studied in details and the male genitalia were illustrated. Type's paratypes and the locality of this newly described Species were mentioned.
ABSTRACT
This research included the preparation and characterization of new demulsifies from natural and synthetic polymers of chitosan and polyvinyl alcohol that are environmentally friendly and at the same time have high efficacy comparable to emulsifiers. imported foreign. The prepared compounds were examined using infrared spectroscopy and nuclear magnetic resonance spectroscopy, and all the spectral signals of the polymers were in good agreement with the chemical composition of the polymers. And the melting and decomposition that occur on polymers at high temperatures. The effect of the length and type of side chain in the compositions of polymers on the process of water separation of oil emulsions w
... Show MoreSchiff base derived from PVA and Erythroascorbic acid derivative (pentulosono-ɣ-lactone-2, 3-enedianisoate) was synthesized and characterized by Thin Layer Chromatography (TLC) and FTIR spectra, aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR and mass spectra. The inhibitory effect of prepared polymer on the activity of human serum Cholinesrerase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.5*10-3 – 4.5*10-8 M).
The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
A number of ehemical ion materials were used as an absorber against solar energy. These materials were selected according to their absorption spectra in the wavelength range 300-800nm where the solar spectrum is coventrated. A solar olleetorw^esigd and The ability of each material inside the collector for absorbing the solar radiation was examined by a converter parameter “R”.According to the “R” parameter, the cohaltous and copperic ions material seems to be of higher capability for absorbing solar energy than the other materials.All the results were analyzed by means of a least-squared fitting program.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More