Organofluorines, as a pollutant, belongs to a group of substances which are very difficult to neutralize. They are part of many products of everyday use and for this reason they pollute the environment in large quantities. Perfluorinated carboxylic acids are entered into the list of the “Stockholm Convention on Persistent Organic Pollutants” in order to minimize the load on the environment by significantly reducing their use, up to their complete rejection. The DD4 strain was isolated from the soil by the enrichment method and identified using 16S rRNA method as Pseudomonas plecoglossicida. It is able to metabolize perfluorooctanoic acid (PFOA) as the only carbon source in Raymond nutrient medium with a concentration of 1000
... Show MoreOne of the most important techniques for preparing nanoparticle material is Pulsed Laser Ablation in Liquid technique (PLAL). Carbon nanoparticles were prepared using PLAL, and the carbon target was immersed in Ultrapure water (UPW) then irradiated with Q-switched Nd:YAG laser (1064 nm) and six ns pulse duration. In this process, an Nd:YAG laser beam was focused near the carbon surface. Nanoparticles synthesized using laser irradiation were studied by observing the effects of varying incident laser pulse intensities (250, 500, 750, 1000) mJ on the particle size (20.52, 36.97, 48.72, and 61.53) nm, respectively. In addition, nanoparticles were characterized by means of the Atomic Force Microscopy (AFM) test, pH easurement
... Show MoreThe high viscosity of heavy oil is a crucial factor that strongly affects its up-stream recovering, down-stream surface transporting and refining processes. Economical methods for recovering the heavy oil and reducing is very important and related to capital and/or operating cost. This research studies the treatment of Iraqi heavy crude oil, which characterize with high viscosity and low API which makes transportation of heavy crude oil a difficult mission, needs for treatment to reduce viscosity for facilitating transportation and processing. Iraqi heavy crude oil was used Sharqi Baghdad, which obtained from Baghdad east oil fields with API 22.2º.Many kinds of additives were used to reduce the viscosity, experiments were performed o
... Show MoreOil/water emulsions are one of the major threats to environment nowadays, occurs at many stages in the production and treatment of crude oil. The oil recovery process adopted will depend on how the oil is present in the water stream. Oil can be found as free oil, as an unstable oil/water emulsion and also as a highly stable oil/water emulsion. The current study was dedicated to the application of microbubble air flotation process for the removal of such oily emulsions for its characters of cost-effective, simple structure, high efficiency and no secondary pollution. The influence of several key parameters on the process removal efficiency was examined, namely, initial oil concentration, pH value of t
A simple, accurate and rapid method for separation and determination of most commonly usedinsecticides in Iraq [thiamethoxam (Thi), imidacloprid (Imi), indoxacarb (Ind), and abamectin (Aba)] ispresented. The separation was performed by gradient reversed-phase high performance liquidchromatography on a C18 stationary phase column. The method was developed and validated. The-1mobile phase was a mixture of acetonitrile and water using gradient flow. The flow rate was 1.0 mL min .The optimum temperature of separation was 25 ºC. The detection was performed at multiple wavelengths.The analysis time was up to 10.5 minutes with retention times of 3.221, 3.854, 6.385, and 9.452 min for-1the studied insecticides. The linearity was in the range of 0.
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More