Multi-walled carbon nanotubes (MWCNTs) were functionalized by hexylamine (HA) in a promising, cost-effective, rapid and microwave-assisted approach. In order to decrease defects and remove acid-treatment stage, functionalization of MWCNTs with HA was carried out in the presence of diazonium reaction. Surface functionality groups and morphology of chemically-functionalized MWCNTS were characterized by FTIR, Raman spectroscopy, thermogravimetric analysis (DTG), and transmission electron microscopy (TEM). To reach a promising dispersibility in oil media, MWCNTs were functionalized with HA. While the cylindrical structures of MWCNTs were remained reasonably intact, characterization results consistently confirmed the sidewall-functionalization of MWCNTs with HA functionalities. Then, HA-treated MWCNTs-based turbine oil nanofluids (HA-MWCNTs/TO) with different volume fractions were synthesized and employed to be investigated in terms of heat transfer potential. Convective heat transfer coefficient of HA-MWCNTs/TO as a positive parameter and pressure drop as a negative factor were investigated for various volume fractions. While results suggested a weak increase in the pressure drop by MWCNTs loading into the TO, lack of acidic agents, the performance index higher than 1 and a significant increase in the convective heat transfer open a new gateway for introducing this economical product for industrial applications in turbines and can be a capable alternative for conventional TO.
Acute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.
This was a single hospital-based prospective study with a durat
A 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The to
... Show MoreAbstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
The novel groups of organic chromophores containing triphenylamine (TPA) (ATP-I to ATP-IV) have been constructed by structural modification of electron donors with substitution biphenyl and bipyridine rings inserting a π-linkage. Density functional theory (DFT) and time-dependent type of it (TD-DFT) have been operated to study results of donating ability of TPA and spacer on absorption, geometrical, photovoltaic, and energetic attributes of these sensitizers. Structural attributes have been revealed that incorporation of TPA, acceptor and π bridge include a perfect coplanar conformation in TPA-III. Based on frequency computations and ground-state optimization, bandgap (Eg) energy, ELUMO, EHOMO have been determined. For enlightening maximu
... Show MoreAbstract
This study deals with the fluctuations of oil revenues and its effect on the public debt. This can be studied through the indicators of debt sustainability, the financial, and economic indicators which express the risk of debt. The study focuses on clarification of the public debt path and its management both domestic and foreign. The sustainability of debt takes an important role according the macroeconomic variables. This study stresses the relationship between the rental economy in Iraq and the risk of the public debt, it is very important to work high oil prices, and on investigating during high work to establish a fund to support the budget deficit. This will reduce future risks arising from the use of publi
... Show More
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More