Because of cost-effective production and abundant resources of calcium, Ca-ion batteries (CIBs) are an appropriate option to alternate Li-ion batteries (LIBs). A new category of anode materials for CIBs has emerged since the successful synthesis of carbon nanotubes, which are B and N doped derivatives of it. For high-performance CIBs, BC2N nanotube (BC2NNT) has been studied as promising anode materials. In order to comprehend electrochemical attributes, cycling stability, and adsorption behavior of BC2NNT, first-principles computations have been executed. Based on nuclear magnetic resonance computations, two types of hexagonal rings (B2C2N2 (I) and BC4N (II)) were specified that are non-aromatic. Ca has adsorption on B2C2N2 and BC4N with adsorption energy (Ead) values of −47.44 and −28.50 kcal/mol, respectively. Specific capacity value has been determined to be as high as 840 mAh/g. The predicted average open-circuit voltage (OCV) for BC2NNT is 1.56 V, which has a larger value than that of other 2D materials. All mentioned reasons provide BC2NNT as an acceptable anode material for use in CIBs. In present research, results may create new ways of designing favorable boron-carbon-nitrogen based anode materials for CIBs.
Electro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreThe enhancement of the thermal and thermo-hydraulic performance of a semi-circular solar air collector (SCSAC) is numerically investigated using porous semi-circular obstacles made of metal foam with and without longitudinal porous Y-shaped fins. Two 10 and 40 PPI porous material samples are examined. Three-dimensional models are built to simulate the performance of SCSAC: model (I) with clear air passage; model (II) with only metal foam obstacles, and model (III) with metal foam obstacles as well as porous Y-fins. COMSOL Multiphysics software version 6.2 based on finite element methodology is employed. A conjugate heat transfer with a (k-ε) turbulence model is selected to simulate both heat transfer and fluid flow across the entir
... Show MoreIn this paper, split-plate airlift electrochemical reactor as an apparatus with new configuration for wastewater treatment was provided. Two aluminum plates were fixed inside the reactor and present two functions; first it works as split plates for internal loop generation of the airlift system (the zone between the two plates acts as riser while the other two zones act as downcomer) and second it works as two electrodes for electrocoagulation process. Simulated wastewater contaminated with zinc ions was used to test the performance of this apparatus for zinc removal by studying the effect of different experimental variables such as initial concentration of zinc (50-800 ppm), electrical current density (2.67-21.4 mA/cm2), init
... Show MoreAnalyze the relationship between genetic variations in the MTHFR gene at SNPs (rs1801131 and rs1801133) and the therapy outcomes for Iraqi patients with rheumatoid arthritis (RA). The study was conducted on a cohort of 95 RA Iraqi patients. Based on their treatment response, the cohort was divided into two groups: the responder (47 patients) and the nonresponder (48 patients), identified after at least three months of methotrexate (MTX) treatment. A polymerase chain reaction-restriction fragment length polymorphism (PCR–RFLP) technique was employed to analyze the MTHFR variations, specifically at rs1801133 and rs1801131. Overall, rs1801131 followed both codominant and dominate models, in which in
Background: Medicinal plants that possess antimicrobial and antioxidant properties have garnered significant attention for their role in maintaining food quality, improving safety, and impeding spoilage. They also can aid in controlling food contamination risks and augmenting the nutritional value of foods. Objective: The study aimed to obtain botanical extracts possessing antimicrobial capabilities and use them to inhibit the growth of molds and yeasts. Additionally, these extracts are aimed at prolonging product shelf life by harnessing their antioxidant attributes. Methods: Several microorganisms, including E. coli and Pseudomonas, were subjected to testing. Ethanolic alcohol, chloroform, and essential oil extracts were prepared;
... Show MoreBackground: Ankylosing spondylitis is a chronic inflammatory disease that mostly involves the spine and sacroiliac joints. It is associated with a decreased quality of life. Biological medicines such as infliximab and its biosimilar are the mainstay treatments for active ankylosing spondylitis.
Objective: The study objective was to conduct a pharmacoeconomic study comparing the cost-effectiveness of the reference infliximab with its biosimilar in ankylosing spondylitis patients visiting public hospitals.
Subjects and Method: This is a two-center pharmacoeconomic study performed at two large teaching governmental hospitals in Baghdad, Iraq, which s
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More