Preferred Language
Articles
/
ijcpe-853
Crystallization Process as a Final Part of Zero Liquid Discharge System for Treatment of East Baghdad Oilfield Produced Water
...Show More Authors

This study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500 rpm), feed concentration (177 and 220 g/l), and time (0.5-9.5 h) on the crystallization performance for oilfield produced water treatment were investigated on evaporation rate and recovery. The recovery increased with increasing temperature and mixing speed while decreasing with an increase in feed concentration. Pure water and salts were recovered from the concentrated produced water, the recovery of pure water at 80 °C, 400 rpm, and 220 g/l feed concentration was 82.22 and 81.35% after 5.5 h for NaCl solution (i.e., simulated oilfield produced water) and oilfield produced water, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Comparative Biochemical Study Between Patient’s Obese and Healthy
...Show More Authors

Objectives: Obesity rates have increased globally with increase in the incidence of comorbidities especially type 2 diabetes mellitus. A cross-sectional study was conducted on healthy obese adults to estimate: (i) comparisons of anthropometric indicators, lipid profile, and glycemic profile in obese compared with non-obese, and (ii) the association of anthropometrics and lipid profile with glycemic profile in obese adults. Methods: The study includes 120 individual with aged ranged (25 – 55) years were enrolled in this study. They were divided into two groups: group one (G1) consist of 90 patients with a body mass index (BMI) of more than 25 kg/m2. Group two (G2) of 30 healthy adults as a co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
2017 7th World Engineering Education Forum (weef)
Sustaining a synergistic industrial advisory board and academic collaboration
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Proceedings Of The 12 Th Scientific Conference Foundation Of Technical Education
Swine Flue A Virus Subtype (H1N1) Infection in Iraqi.
...Show More Authors

Background: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref