This study investigated the application of the crystallization process for oilfield produced water from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). Zero liquid discharge system (ZLD) consists of several parts such as oil skimming, coagulation/flocculation, forward osmosis, and crystallization, the crystallization process is a final part of a zero liquid discharge system. The laboratory-scale simple evaporation system was used to evaluate the performance of the crystallization process. In this work, sodium chloride solution and East Baghdad oilfield produced water were used as a feed solution with a concentration of 177 and 220 g/l. The impact of temperature (70, 80, and 90 °C), mixing speed (300, 400, and 500 rpm), feed concentration (177 and 220 g/l), and time (0.5-9.5 h) on the crystallization performance for oilfield produced water treatment were investigated on evaporation rate and recovery. The recovery increased with increasing temperature and mixing speed while decreasing with an increase in feed concentration. Pure water and salts were recovered from the concentrated produced water, the recovery of pure water at 80 °C, 400 rpm, and 220 g/l feed concentration was 82.22 and 81.35% after 5.5 h for NaCl solution (i.e., simulated oilfield produced water) and oilfield produced water, respectively.
Copper (Cu) is an essential trace element for the efficient functioning of living organisms. Cu can enter the body in different ways, and when it surpasses the range of biological tolerance, it can have negative consequences. The use of different nanoparticles, especially metal oxide nanoparticles, is increasingly being expanded in the fields of industry and biomedical materials. However, the impact of these nanoparticles on human health is still not completely elucidated. This comparative study was conducted to evaluate the impacts of copper oxide nanoparticles (CuO NPs) and copper sulphate (CuSO4 0.5 (H2O)) on infertility and reproductive function in male albino mice BALB/c. Body weight, the weight of male reproductive organs, mal
... Show MoreBackground: Most primary Health Care Centers (PHCCs) in Iraq have a referral system records; however, this mechanism does not function well because of the lack of other requirements for an efficient referral system.
Objective: To assess the practice & opinion of doctors in PHCs toward the referral system, and to determine the doctors in PHC's commitment to referral system instructions and guidelines.
Subjects and methods: A cross-sectional study with analytic elements was conducted in nine health directorates in Iraq, from the 1st October 2018 – 30th June 2019.One PHC was selected randomly form each sector in every governorate, A questionnaire was used to collect the required information.
... Show MoreThe study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord
... Show MoreNowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Cancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More