The electrochemical behavior of carbon steel in water sweetening station in Libya has been studied in the range of ( 293–333 oC) using weight loss technique. Measurements were carried out over a range of Reynolds number (5000 – 25000).An apparatus was designed for studying the corrosion process in the turbulent regime, which is of industrial significance. It was found that The corrosion rate of carbon steel in water sweetening station is under diffusion control and increases with increasing Reynolds number. On the other hand the variation of corrosion rate with temperature in the range of (293–333 oC) was found to follow Arrhenius equation and the activation energy approximately the same except at low Reynolds number.
The aim of present work is to study the removal of phenol present in aqueous feed solution by the emulsion liquid membrane technique using kerosene as a diluent, sodium hydroxide as a stripping agent, and sorbitan monooleate (Span 80) as a surfactant. The parameters studied were: surfactant concentration, volume ratio of membrane phase to internal phase, and stirring speed. It was found that more than 98% of phenol can be removed at the conditions were surfactant concentration 2% (v/v), volume ratio of membrane phase to internal phase 5:1 and stirring speed 400 rpm. Maximum phenol extraction efficiency at 7 minutes of process time was observed. It was found that there was a good agreement between the standard kerosene an
... Show MoreThere is a relationship between the sizes of urban centers and regional
development, concerning the role that these centers are playing in
developmental process.
The research assume that the urban system in the governorate, has
been affected by the external environment due to the religious dominance of
Kerbla city.
The research is composed of three sections, the first is a theoretical
background, which focus upon the general directions of the models and
theories that have a relationship with the subject. The second is a practical
part aims at determination the characteristics of the sizes of the cities in the
governorate. Depending upon of previous part, i.e., the practical part section three deals with
Background: Diabetes and periodontitis are considered as chronic diseases with a bidirectional relationship between them. This study aimed to determine and compare the severity of periodontal health status and salivary parameters in diabetic and non-diabetic patients with chronic periodontitis. Materials and Methods: Seventy participants were enrolled in this study. The subjects were divided into three groups: Group I: 25 patients had type 2 diabetes mellitus with chronic periodontitis, Group 2: 25 patients had chronic periodontitis and with no history of any systemic diseases, Group 3: 20 subjects had healthy periodontium and were systemically healthy. Unstimulated whole saliva was collected for measurement of salivary flow rate and pH.
... Show MoreAs tight gas reservoirs (TGRs) become more significant to the future of the gas industry, investigation into the best methods for the evaluation of field performance is critical. While hydraulic fractured well in TRGs are proven to be most viable options for economic recovery of gas, the interpretation of pressure transient or well test data from hydraulic fractured well in TGRs for the accurate estimation of important reservoirs and fracture properties (e.g. fracture length, fracture conductivity, skin and reservoir permeability) is rather very complex and difficult because of the existence of multiple flow profiles/regimes. The flow regimes are complex in TGRs due to the large hydraulic fractures n
AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreUse of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show More