This study offers additional evidence for the occurrence of oil residues within fractures of the basement rocks in the Upper Benue Trough, Nigeria. The data suggests that the observed oil residues were originally generated as light oils, which were later biodegraded into heavy oils. These Upper Benue Trough's oil stains are a valuable tool for hydrocarbon exploration in the region as they indicate the existence of a petroleum system in the basin. We find a strong similarity to the proportions of C27, C28, and C29 regular steranes of oils found in the sandstones and shales of the Bima Formation in the Upper Benue Trough when we plot the relative quantities of these steranes of the investigated basement rock oil types on a ternary gra
... Show MorePhysical model tests were simulated non-aqueous phase liquid (NAPL) spill in two-dimensional
domain above the water table. Four laboratory experiments were carried out in the sand-filled
tank. The evolution of the plume was observed through the transparent side of this tank and the
contaminant front was traced at appropriate intervals. The materials used in these experiments
were Al-Najaf sand as a porous medium and kerosene as contaminant.
The results of the experiments showed that after kerosene spreading comes to a halt (ceased) in
the homogeneous sand, the bulk of this contaminant is contained within a pancake-shaped lens
situated on top of the capillary fringe.
Twenty five vaginal swabs from outpatients' healthy women were collected from Kamal Al-Samarai Hospital, Baghdad, to isolate and identify of Lactobacillus acidophilus. Three isolates were diagnosed as L. acidophilus which represents 15% of the total number of lactic acid bacterial (LAB) isolates; other LAB types represent 65% (20 isolates).The ability of L. acidophilus to produce surlactin was detected after measuring its biological activity to inhibit the adhesion of biofilm formed by Pseudomonas aeruginosa to surfaces using test tube method. It was found that all isolates were able to produce surlactin but the activity of surlactin was varying in each isolate. Surlactin produced by isolates 1 and 13 was the most effective. Biological appl
... Show MoreThis study aimed to investigate the feasibility of treatment actual potato chips processing wastewater in a continuously operated dual chambers microbial fuel cell (MFC) inoculated with anaerobic sludge. The results demonstrated significant removal of COD and suspended solids of more than 99% associated with relatively high generation of current and power densities of 612.5 mW/m3 and 1750 mA/m3, respectively at 100 Ω external resistance.
Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreObjective Neutrophils own an arsenal of dischargeable chemicals that enable them to handle bacterial challenges, manipulating innate immune response and actual participation in acquired immunity. The reactive oxygen species (ROS) are one of the most important chemicals that neutrophils discharge to eradicate pathogens. Despite their beneficial role, the ROS were strongly correlated to periodontal tissue destruction. Lowdensity neutrophils (LDN) have been recognized for producing enhanced quantities of ROS. However, the potential role of ROS produced by LDN in periodontitis is unknown. The aim of the study was to investigate the impact of ROS produced by LDN in periodontal diseases.
Current design codes and specifications allow for part of the bonded flexure tension reinforcement to be distributed over an effective flange width when the T-beams' flanges are in tension. This study presents an experimental and numerical investigation on the reinforced concrete flanged section's flexural behavior when reinforcement in the tension flange is laterally distributed. To achieve the goals of the study, numerical analysis using the finite element method was conducted on discretized flanged beam models validated via experimentally tested T-beam specimen. Parametric study was performed to investigate the effect of different parameters on the T-beams flexural behavior. The study revealed that a significant reduction in the
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More