Two homopolymeric and three copolymeric additives for base oil were synthesized using octyl acrylate (OA) and tert-butyl acrylamide (TBA) monomers. The two additives named P1 and P2 are the homopolymers of TBA and OA, respectively, whereas copolymeric additives named Co1, Co2, and Co3 were synthesized by varying the ratios of TBA:OA as 1:3, 3:1 and 1:1, respectively. The prepared polymers were characterized by Fourier Transform Infrared (FTIR). Based on the solubility of synthesized polymers in base oil and reactivity ratios of TBA/OA copolymer (0.222, 0.434) calculated by Fineman-Ross method, P2, Co1, Co2 and Co3 were selected to evaluate their performance as pour point depressant (PPD), viscosity improver (VII), and anticorrosion additives in base oil. Additives P2 and Co1 showed the best performance as (PPD) and (VII) whereas Co2 and Co3 revealed the best performance as anticorrosion additives. The flash point of base oil increased as a concentration of polymeric additives increased in the base oil. In addition to study the performance of synthesized polymers as lubricant additives, the capability of polymers for removing CuII from synthetic wastewater was also investigated. Different parameters such as pH of solution, contact time, and CuII concentration were changed in order to study their effect on adsorption capacity of polymers. Generally, polymers with high TBA content such as P1, Co2, and Co3 showed good performance in removing CuII.
Nosocomial infection is acquired contamination of hospitals and health care units caused by multidrug resistant bacteria. Currently, bacterial resistance to antimicrobial medication represents a complicated public health problem. Recent studies on the antimicrobial activity of silver nanoparticles (AgNPs) attracted researchers worldwide to focus on the safe synthesis of AgNPs as antimicrobial agents against multidrug resistant bacteria. The antimicrobial efficacy of AgNPs on pathogenic bacteria isolated from clinical cases of acquired hospital infection was targeted in this project. Fifty specimens of stool were collected through private laboratories in Baghdad from patients who suffered diarrheal symptoms. Bacterial isolation, identific
... Show MorePurpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palata
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More