In this study, polymeric coating was developed by incorporating nano graphene in the polymer blend with applications to oil storage tanks. The oil storage tanks samples were brought from the oil Pipeline Company / Doura refinery in Baghdad. The coating polymer was formed with a blend (epoxy resin and repcoat ZR). The proportion of mixing the mixture was 3:1:1 epoxy resin 21.06 gm: repcoat ZR 10.53 gm: hardener 10.53 gm. The blend/graphene was prepared using in stui-polymerization method with different weight percentage 1, 3, 5, and 7 wt % added to blend. The resulting solution was put in a glass tube on a magnetic stirrer for one hour at a temperature of 40 °C. The result of contact angle and water absorption the best ratio of 3wt % (73.46). The current work confirms that the thermal stability of the nanocomposites increases gradually with increasing the percentage of Gr compared to the blend without adding Gr nano and this is due to the thermal resistance of the Gr nano.
This research is seeks to state the role of Green Human Resources Management Practices and their dimensions (Green Employment and Selection, Green Performance Assessment, Green Training & Development and Green Compensation and Stimulation Systems) in strengthening the Strategic Positioning in the Nongovernmental Hospitals in Erbil city, and aims to analyze the relationship between Green Human Resources Management Practices and Strategic Positioning and to show the impact of Green Human Resources Management Practices in determining the Strategic Position.
It is depended on a questionnaire as key tools for achieving data, as designed on
... Show MoreThe orient culture and heritage has directly influenced ,in a way or another , the literary works which recently have been noted by the oriental Jews inside and outside of Israel. Several Jewish writers, who came from the orient (especially from Iran ), have written their works while influenced by traditions and customs of the Iranian society, in which they were born , lived , and raised, and by the writers who were born in that society and then moved to Israel and lived there as a result of the Zionism and its notorious promises to gather Jewish people from all over the world to establish their national home at the expense of the Palestinian land and people.
That final
... Show MoreThe extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100˚C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6:1 ml: g amount of water to eucalyptus leaves Ratio.
Field trial was conducted during the growing season of 2011-2012 at the Research
Field, Department of Biology, College of Science, Baghdad University to test the
performance of wheat cv Rabyaa, Latifiya, Al-Iraq, Tummose 2, Abu-Graib 3, IPA
99 and Sham 6 grown under different soil water deficit stresses. Several agronomic
and physiological traits and yield and yield components of the test cultivars were
determined. The experiment was conducted in split plot design with five replications
for each treatment. The cultivars were kept in the sub plot while water stress
treatment was assigned as main plot. Water stress was applied by irrigated the plots
to the soil field capacity (FC) then withheld next irrigation until
An experimental study was conducted with low cost natural waste adsorbent materials, barley husks and eggshells, for the removal of Levofloxacine (LEVX) antibacterial from synthetic waste water. Batch sorption tests were conducted to study their isothermal adsorption capacity and compared with conventional activated carbon which were, activated carbon > barley husks > eggshells with removal efficiencies 74, 71 and 42 % with adsorbents doses of 5, 5 and 50 g/L of activated carbon, barley husks, and eggshells respectively. The equilibrium sorption isotherms had been analyzed by Langmuir, Freundlich, and Sips models, and their parameters were evaluated. The experimental data were correlated well with the Langmuir model which gives the
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.