Manganese-zinc ferrite MnxZn1-xFe2O4 (MnZnF) powder was prepared using the sol-gel method. The morphological, structural, and magnetic properties of MnZnF powder were studied using X-ray diffraction (XRD), atomic force microscopy (AFM), energy dispersive X-ray (EDX), field emission-scanning electron microscopes (FE-SEM), and vibrating sample magnetometers (VSM). The XRD results showed that the MnxZn1-xFe2O4 that was formed had a trigonal crystalline structure. AFM results showed that the average diameter of Manganese-Zinc Ferrite is 55.35 nm, indicating that the sample has a nanostructure dimension. The EDX spectrum revealed the presence of transition metals (Mn, Fe, Zn, and O) in Manganese-Zinc Ferrite. The FE-SEM results of MnZnF showed uniform spherical structures. VSM was used to study the change in magnetization, the saturation magnetization, (Ms) value of the samples. The measurement of VSM indicated that the MnZnF exhibits ferromagnetic behavior with coercivity Hc (0.0014 Gauss), remanent magnetization (Mr) (0.202 emu/gr), and saturation magnetization Ms (2.69 emu/g).
One of the challenging issues encountered during drilling operations is the lost circulation. Numerous issues might arise because of losses, such as wasting of time and higher drilling cost. Several types of lost circulation materials have been developed and are being used to limit mud losses and avoid associated issues. Each solution has benefits and drawbacks.
In this study, a core flooding test was performed to study the effectiveness of polyacrylamide (PAM) granular gel on the reduction of the circulation lost. One common type of fracture characteristic is fractures with tips, commonly known as partially open fracture (POF). However, PAM gel therapy in POFs received little attention in prior research. Models of partly open fra
... Show MoreGenerally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show Moreطريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreA mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading.
The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose.
&nb
... Show MoreA mathematical model was proposed to study the microkinetics of esterification reaction of oleic acid with ethanol over prepared HY zeolite catalyst. The catalyst was prepared from Iraqi kaolin source and its properties were characterized by different techniques. The esterification was done under different temperature (40 to 70˚C) with 6:1 for molar ratio of ethanol to oleic acid and 5 % catalyst loading. The microkinetics study was done over two period of time each period was examined individually to calculate the reaction rate constant and activation energy. The impact of the mass transfer resistance to the reactant was also investigated; two different studies have been accomplished to do this purpose. The e
... Show More
|