The objective of this research is to select the most suitable drilling location of new groundwater exploration wells, with a decision-making tool from Geographic Information System (GIS). The optimum location will be evaluated base on the hydro-geoelectrical parameter derived from Vertical Electrical Sound (VES) including Longitudinal Conductance, the thickness of the aquifer, the apparent resistivity and Transmissivity. From the Geo-electrical method (VES) the finds shows that the aquifers in the study area have Apparent Resistivity ranging from 0.32 to 40.24 Ωm, Thickness between 0.21 m to 15.06 m, Longitudinal Conductance ranging from 0.006 to 10.246Ω-1 and Transmissivity ranging from 0.14 to
... Show MoreCalcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic
Treatises concerning analyzing the interior spaces multiplied and their directions varied, that some of them analyzed the interior space on the basis of the intellectual and philosophical affiliation or the historical period and others in the light of the concept and mechanisms of the shape. The researcher has not been able to find a research that dealt with analyzing the space within the systems of shape generation, thus it is possible to determine the research problem with the following question: to what extent is it possible to analyze the interior space based on systems of shape generation? As far as the importance of the research is concerned, it sheds light on five of the systems of the shape generation which are: Syntax, shape gra
... Show MoreBackground: Dentin removed during root canal system instrumentation for creating adequate geometry for the canal and cleaning the canal. A new instrument had been marketed with the aim of optimum shaping of all parts of the canal system, however, no information present about the amount of dentin removal compared to conventional rotary system. This study investigated the amount of dentin removal when the canal instrumented by SAF compared with ProTaper by using high resolution computed tomography (micro CT). Materials and Methods: Twenty extracted single canalled teeth were utilized for this study; and randomly divided into 2 groups. In the first group, the root canals were prepared by using protaper rotary system till F2 and the root canal
... Show MoreBackground: The aim of this study was to evaluate the effect of three types of light curing devices QTH, LED and Flashmax on the surface microhardness of three types of bulkfill composite resins; Filtek Bulkfill posterior composite ( 3M), Tetric Evo Ceram ( Ivoclar Vivadent) and Sonicfill composite ( Kerr) Materials and methods: Total number of 90 samples was prepared, 30 samples for each type of bulkfill composite, were divided into three main groups, group A: Filtek posterior bulkfil (3M), group B: Tetric Evo Ceram (Ivoclar Vivadent) and group C: contain Sonicfill composite (kerr). Which then divided into three subgroups (n= 10) (1) Samples cured by QTH system (2) Samples cured by LED system and (3) samples cured by Flashmax system the
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show More