In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also found that the use of (SSMC) leads to increase in yield by a factor of 3 of (SWNTs) and produces nanocoil at the same time.
Innovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high inj
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreIn the present work the clathrate hydrate dissociation enthalpies of refrigerant R134a+ water system, and R134a + water + salt system were determined. The heat of dissociation of three types of aqueous salts solutions of NaCl, KBr and NaF at three concentrations (0.09, 0.17and 0.26) mol·kg−1 for each salt type, were enthalpy measured. The Clapeyron equation was used tocalculate heat of dissociation of experimental data for binary and ternary system.In order to find the effect of compressibility factor on heat dissociation enthalpy, the study was conducted by using equation of state proposed by Peng and Robinson Stryjek-Vera (PRSV). The obtained results of dissociation enthalpy for binary system were (143.8) kJ.mol-1
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
The problem of finding the cyclic decomposition (c.d.) for the groups ), where prime upper than 9 is determined in this work. Also, we compute the Artin characters (A.ch.) and Artin indicator (A.ind.) for the same groups, we obtain that after computing the conjugacy classes, cyclic subgroups, the ordinary character table (o.ch.ta.) and the rational valued character table for each group.
Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
A range of macrocyclic dinuclear metal (II) dithiocarbamate-based complexes are reported. The preparation of complexes was accomplished from either mixing of the prepared ligand with a metal ion or through a template one-pot reaction. The preparation of the bisamine precursor was achieved through several synthetic steps. The free ligand; potassium 2,2'-(biphenyl-4,4'-diylbis(azanediyl))bis(1-chloro-2-oxoethane-2,1diyl)bis(cyclohexylcarbamodithioate) (L) was yielded from the addition of CS2 to a bis-amine precursor in KOH medium.A variety of analytical and physical methods were implemented to characterise ligand and its complexes. The analyses were based on spectroscopic techniques (FTIR, UV-Vis, mass spectroscopy and 1H, 13C-NMR sp
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis