This study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500 rpm), feed concentration (177 and 220 g/l), and time (0.5-9.5 h) on the crystallization performance for oilfield produced water treatment were investigated on evaporation rate and recovery. The recovery increased with increasing temperature and mixing speed while decreasing with an increase in feed concentration. Pure water and salts were recovered from the concentrated produced water, the recovery of pure water at 80 °C, 400 rpm, and 220 g/l feed concentration was 82.22 and 81.35% after 5.5 h for NaCl solution (i.e., simulated oilfield produced water) and oilfield produced water, respectively.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreProtein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In this paper solar radiation was studied over a region of Baghdad (Latitude 33.3o and longitude 44.4o). The two parts of global solar radiation: diffuse and direct solar radiation were estimated depending on the clearance index of measured data (Average Monthly mean global solar radiation). Metrological data of measured (average monthly mean diffuse and direct solar radiation) were used to comparison the results and show the agreement between them. Results are determined by applying Liu and Jordan two models (1960). Excel 2007program is used in calculation, graphics and comparison the results.
Purpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.
Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th
... Show MoreThe phenomenon of informal building Spread recently in Iraqi residential areas, in general, and in Baghdad, in particular, due to the urgent housing need, on the one hand, and lack of commitment to building controls, on the other hand, to highlight the phenomenon of uncommitted building to controls and housing governing legislation in Iraq, leading to heterogeneity in both building densities and plot areas, and disorder in the urban fabric and urban escape of those areas. Research problem identified as the absence of a clear vision about the General aspects of the phenomenon of informal building in residential street scene, and the role of designed housing projects as a substitute for informal building in built residential areas. The des
... Show More