In this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3. The BVM model perfectly expressed the bioelectrochemical reactions in the anodic-chamber. The experimental measurements for all the studied organic loadings agreed with the model predicted values by an estimated determination factor (R2) of 0.96, proving the validity of the proposed mathematical model to express the anodic bioelectrochemical reactions in the MFC. Also, the sustainable power generated from each cycle was evaluated, and it was found that higher sustainable energy can be harvested from higher organic loading 1000 g/L, which achieved maximum sustainable energy of 0.83 W/m3.
A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreThe snthesis and characterization of cobalt(II), nickel(II), copper(II) and zinc(II) complexes of azo ligand 4-[(5-acetyl-2-aminophenyl)- diazenyl]-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one derived from 4-aminoantipyrine and 4-aminoacetophenone are reported. The nature of the compounds have been studied followed by mole ratio and methods of continuous contrast, Beer′s law followed during a condensation rate (1 × 10-4 – 3 × 10-4 M). The analytical data showed that all the complexes are in 1:2 metal-ligand ratio. An octahedral geometry have been suggested for all the compounds and biological studies of all the complexes were evaluated against different types of antimicrobial strains.
Most dental works require a diagnostic impression; alginate is contemplated as the most popular material used for this purpose. Titanium dioxide nanoparticles show evidence of antimicrobial activity in the recent era, for this purpose, this study aimed to evaluate the effect of adding Titanium dioxide nanoparticles on antimicrobial activity and surface detail reproduction of alginate impression material. Materials and methods: Titanium dioxide nanoparticles (purity = 99%, size= 20nm) was added to alginate at three different concentrations (2%, 3% and 5%). 84 samples were prepared in total. Samples were tested for antimicrobial activity using a disc diffusion test, and surface detail reproduction was done using (ISO 21563:2021). One-way A
... Show MoreINFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE
INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM CV BARHI BY USING CELL SUSPENSION CULTURE TECHNIQUEe
Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed