Biodiesel production from microalgae depends on the biomass and lipid production. Both biomass and lipid accumulation is controlled by several factors. The effect of various culture media (BG11, BBM, and Urea), nutrients stress [nitrogen (N), phosphorous (P), magnesium (Mg) and carbonate (CO3)] and gamma (γ) radiation on the growth and lipid accumulation of Dictyochloropsis splendida were investigated. The highest biomass and lipid yield of D. splendida were achieved on BG11 medium. Cultivation of D. splendida in a medium containing 3000 mg L−1 N, or 160 mg L−1 P, or 113 mg L−1 Mg, or 20 mg L-1 CO3, led to enhanced growth rate. While under the low concentrations of nutrients caused a marked increase in the lipid content. Cultures exposure to 25 Gy of γ-rays, led to an increase in lipid content up to 18.26 ± 0.81 %. Lipid profile showed the maximum presence of saturated fatty acids (SFAs, 63.33%), and unsaturated fatty acids (UFAs, 37.02%). Fatty acids (FAs) recorded the predominance of C16:0, C18:2, C15:0 and C16:1, which strongly proved D. splendida is a promising feedstock for biodiesel production.
This work deals with the effect of adding aluminum nanoparticles on the mechanical properties, micro-hardness and porosity of memory-shape alloys (Cu-Al-Ni). These alloys have wide applications in various industrial fields such as (high damping compounds and self-lubricating applications). The samples are manufactured using the powder metallurgy method, which involved pressing in only one direction and sintered in a furnace surrounded by an inert gas. Four percentages (0%, 5%, 10%, and 15%) of aluminum nanoparticles were fabricated, which depended on the weight of aluminum powder (13%) in the sample under study. To find out which phase is responsible for the reliability of the formation of this type of alloy and its porosity, X-ray diffr
... Show MoreLaser cleaning of materials’ surfaces implies the removal of deposited pollutants without affecting the material. Nanosecond Nd:YAG pulsed laser, operating at 1064 nm and 532nm, was utilized. Different laser intensities and number of pulses were used on metallic and non-metallic surfaces under O2 and Ar environments to remove metal oxide and crust. Cleaning efficiency was studied by optical microscope. The results indicated the superiority of 1064 nm over the 532 nm wavelength without any detectable damage to materials’ surfaces. Marble cleaned in Oxygen gas environment was better than in Ar gas.
objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show More