In this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimentally. The TC measurement showed an enhancement of about 3% for INF and of 1% MWCNT in [EMIM][BF4] at a temperature of 298.15 K: the TC was 0.186 W/m.K, the kinematic viscosity was 100 centistokes (cSt), and the density was 1.283 g.cm−3. On the other hand, the TC of 1% MWCNT in [HMIM][PF6] INF enhanced by 5%. In this case, at a temperature of 298.15 K, the TC was 0.158 W/m, the kinematic viscosity was 1200 cSt, and the density was 1.294 g.cm−3. Furthermore, the stability of the prepared INFs was measured using the zeta potential method after 28 days of preparation. The results show very good dispersion of the nanoparticles in the ILs for all the prepared INFs. The zeta potential was -69.30 mV and - 45.34 mV for 0.5% and 1% MWCNT in [EMIM][BF4], respectively. On the other hand, zeta potential was -51.78 and -46.67 mV for 0.5% and 1% MWCNT in [HMIM][PF6], respectively. According to the obtained results, the preferable INFs to use as a cooling medium at 25 °C was the INF of 1 wt% MWCNT in [EMIM][BF4], since it provides better thermophysical properties than the other prepared INFs.
This paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopi
... Show MoreBlockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent
... Show MorePseudomonas aeruginosa produces an extracellular bioï¬lm matrix that consists of nucleic acids, exopolysaccharides, lipid vesicles, and proteins. Alginate, Psl and Pel are three exopolysaccharides that constitute the main components in biofilm matrix, with many biological functions attributed to them, especially concerning the protection of the bacterial cell from antimicrobial agents and immune responses. A total of 25 gentamicin-resistant P. aeruginosa selected isolates were enrolled in this study. Biofilm development was observed in 96% of the isolates. In addition, the present results clarified the presence of pelA and pslA in all the studied isolates. The expression of these genes was very low. Even though all biof
... Show MoreThis contribution investigates the impact of adding transition metal of Ti to CeOy samples at various concentrations referring to 0, 15.84, 24.46, 34.46, 36.23, 38.46, 45.38% and pure TiOy, correspondingly. The samples were fabricated by the magnetron sputtering technique. X-ray diffraction (XRD) configurations demonstrate the presence of α-Ce2O3 and Ce2O3 phases with increased Ti contents in the systems. X-ray photoelectron spectroscopy (XPS) experimentation confirms the purity of the S1-sample (CeO2) and the purity of the S8-sample (TiO2). Further XPS analysis reveals that Ti incorporation in the doped systems functions as a reducing agent because of the existence of α-Ce2O3 and Ce2O3 phases. Moreover, based on UV–vis spectroscopy res
... Show MoreThis paper details the process of designing, analysing, manufacturing, and testing an integrated solid-state hydrogen storage system. Analysis is performed to optimise flow distribution and pressure drop through the channels, and experimental investigations compare the effects of profile shape on the overall power output from the fuel cell. The storing of hydrogen is given much attention in the selection of a storage medium, and the effect of a cooling system to reduce the recharging time of the hydrogen storage vessel. The PTFE seal performed excellently, holding pressure over 60 bar, despite requiring changing each time the cell is opened. The assembly of the vessel was simple and straightforward, and there was no indication of pressure
... Show MoreThe knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony
... Show MoreThe process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microsc
... Show MoreThis study observed the formation of struvite crystals in wastewater using natural zeolite activated with Mg2+ ions. Mg2+ ions released from natural zeolite would react with PO43- and NH4+ ions from in wastewater to form struvite crystals. The results showed that at pH 8.5, the removal of PO43- and NH4+ ions was more effective using the modified zeolite than the natural zeolite. Adding 40 g/L Zeo-Mg (1) produced the best results, with PO43- (93.32%) and NH4 (40%) adsorption. Meanwhile, 40g/L Zeo-Mg (2) adsorbed 81% PO43- ions and 27.12% NH4+ ions. The eqil
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show More