This paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation of B.G dye. All the conditions above have been studied to reach the optimum operation condition for the two processes Fenton and photo- Fenton. The B.G degradation process follows first- order reaction rules. Photo- Fenton process causes a more efficient oxidation rate than the Fenton process. So, the photo- Fenton degradation is an effective and economic process by producing higher percentage of degradation and mineralization in short radiation time.
Permeability data has major importance work that should be handled in all reservoir simulation studies. The importance of permeability data increases in mature oil and gas fields due to its sensitivity for the requirements of some specific improved recoveries. However, the industry has a huge source of data of air permeability measurements against little number of liquid permeability values. This is due to the relatively high cost of special core analysis.
The current study suggests a correlation to convert air permeability data that are conventionally measured during laboratory core analysis into liquid permeability. This correlation introduces a feasible estimation in cases of data loose and poorly consolidated formations, or in cas
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreKnowledge of permeability, which is the ability of rocks to transmit the fluid, is important for understanding the flow mechanisms in oil and gas reservoirs.
Permeability is best measured in the laboratory on cored rock taken from the reservoir. Coring is expensive and time-consuming in comparison to the electronic survey techniques most commonly used to gain information about permeability.
Yamama formation was chosen, to predict the permeability by using FZI method. Yamama Formation is the main lower cretaceous carbonate reservoir in southern of Iraq. This formation is made up mainly of limestone. Yamama formation was deposited on a gradually rising basin floor. The digenesis of Yamama sediments is very important due to its direct
An ingrowing toenail is a common problem affecting mainly adolescents and young adults, with a male predominance of 3:1. The disorder generally occurs in big toes. It is painful and often chronic and it affects work and social activities. Most patients initially complain of pain and later discharge, infection and difficulty in walking occur. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of ingrowing toe nail. Patients, Materials & Methods: This study was done in laser medicine research clinics from July 2013 to the end of December 2013; 10 patients including 7(70%) males and 3 (30%) females with age ranging from 18 years to 70 years with mean age of 44 years o
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreFerritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m
... Show MoreMedical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show More