Changing oil-wet surfaces toward higher water wettability is of key importance in subsurface engineering applications. This includes petroleum recovery from fractured limestone reservoirs, which are typically mixed or oil-wet, resulting in poor productivity as conventional waterflooding techniques are inefficient. A wettability change toward more water-wet would significantly improve oil displacement efficiency, and thus productivity. Another area where such a wettability shift would be highly beneficial is carbon geo-sequestration, where compressed CO2 is pumped underground for storage. It has recently been identified that more water-wet formations can store more CO2. We thus examined how silica based nanofluids can induce such a wettabil
... Show MoreThis day, we see the Significant role that social media platforms play, it plays a vital role in shaping the Social, political, and economic awareness of individuals. The Iraqi Society, which is experiencing rapid cultural and social transformations, is considered a fertile ground for social media and its influences, whether negative or positive. Research and studies indicate that the negative use of social media will lead to weaking of the sense of belonging and citizenship among members of Iraqi society. This, in turn, threatens moral and educational values, increases feelings of family estrangement, and leads to social isolation. On the contrary, if social is used correctly, it can significantly contribute to enhancing educational values
... Show MoreThis research involves the synthesis of some sulphanyl benzimidazole derivatives (Ia-c), which were prepared from reaction of 2-mercaptobenzimidazole substituted benzyl halide, and structures were identified by spectral methods[FTIR, 1H-NMR and 13C-NMR].These compounds were investigated as corrosion inhibitors for carbon steel in 1M H2SO4 solution using weight loss, potentiostatic polarization methods; obtained results showed that the sulphanyl benzimidazole derivatives retard both cathodic and anodic reactions in acidic media, by virtue of adsorption on the carbon steel surface. This adsorption obeyed Langmuir’s adsorption isotherm. The inhibition efficiency of (Ia-c) ranging between (65-92) %. By using different Ib derivative conc
... Show MoreThe debate on the methodology of media and communication research is no longer subject to the logic of the contradiction between the quantitative and the qualitative approach, nor the logic of the comparison between them. The nature of the topics presented for research, the problems they raise, the goals to be achieved from the research, and the epistemological positioning of researchers are among the critical factors that dictate the appropriate approach or methodological approaches to conduct their research. This positioning means the implicit philosophical principles upon which any researcher relies and which determine the path he/ she takes to produce scientifically approved knowledge. The method of the researcher's access to the phe
... Show Moreوفقأ للدراسات السابقة تم تحضير ليكاند آزو جديد (ن-(3-اسيتايل-2-هيدروكسي-5-مثيل-فنيل)ن-(4-كاربوكسي-سايكلوهكسيل مثيل)-ملح الدايازونيوم) وبعد التحقق من الصيغة المقترحة وفق نتائج التحاليل وبعد استخدام الليكاند لتحضير سلسلة ن المعقدات باستخدام نسب مولية متساوية (1:1) من الليكاند وتفاعلها مع كل من املاح المنغنيز والكوبلت والنيكل والنحاس والخارصين وبعد التحقق وفق تقنيات التحاليل الطيفية والتشخيصية(الاشعة فوق البنف
... Show MoreMetronidazole-MIPs were prepared by using (MDZ) as the template as well as allylchloride (AYC) or allylbromide (AYB) as monomer, used (TMPTA) tri-methylol propane tri-acrylate or ethylene glycol di-methyl acrylate (EGDMA) as cross-linker and initiator used (BP) benzyl peroxide. By using different plasticizers (di butyl Phthalate (DBPH), Nitrobenzene (NB), oleic acid (OA) and paraffin) for MDZ-MIP1 and (Di-butyl sebecate (DBS), Di-methyl acrylate (DMA), Tributylphosphate(TBP) and Tris(ethylhexyl phosphate (TEHP) ) for MDZ-MIP2. Membranes of MIPs were prepared in PVC matrix. The characterizations of each electrode were determined The Slope range from (55.083 - 43.711) mV/decade, Limit of Detection (8 X 10 -4- 2 X 10-6) and Linearity
... Show MoreAbstract
A series of new 4(3H)-quinazolinone derivatives (S1-S4) were synthesized and characterized by FTIR,1HNMR and 13CNMR .Their cytotoxic activity against a set of human cancer cell lines MCF-7 (breast) and A549 (lung) was evaluated using MTT assay. To detect their selectivity toward cancer cells, the compounds were also tested against epithelial cells derived from normal human fibroblast (NHF). Methotrexate (MTX) was used as a reference for comparison . All the tested compounds exhibited toxicity against the normal cells lower than cancer cells. All the tested compounds displayed higher cytotoxicity against lung cancer cell line (A549) than MTX with the most
... Show MoreA group of amino derivatives [4-aminobenzenesulfonamide,4-amino-N¹ methylbenzenesulfonamide, or N¹-(4-aminophenylsulfonyl)acetamide] bound to carboxyl group of mefenamic acid a well known nonsteroidal anti-inflammatory drugs (NSAIDs) were designed and synthesized for evaluation as a potential anti-inflammatory agent. In vivo acute anti-inflammatory activity of the final compounds (9, 10 and 11) was evaluated in rat using egg-white induced edema model of inflammation in a dose equivalent to (7.5mg/Kg) of mefenamic acid. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the 4-amino-N-methylbenzenesulfonamide derivative (c
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More