Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable
To evaluate the bioactivity and the cytocompatibility of experimental Bioglass-reinforced polyethylene-based root-canal filling materials. The thermal properties of the experimental materials were also evaluated using differential scanning calorimetry, while their radiopacity was assessed using a grey-scale value (GSV) aluminium step wedge and a phosphor plate digital system. Bioglass 45S5 (BAG), polyethylene and Strontium oxide (SrO) were used to create tailored composite fibres. The filler distribution within the composites was assessed using SEM, while their bioactivity was evaluated through infrared spectroscopy (FTIR) after storage in simulated body fluid (SBF). The radiopacity of the composite fibres and their thermal properties were
... Show MoreIn many oil-recovery systems, relative permeabilities (kr) are essential flow factors that affect fluid dispersion and output from petroleum resources. Traditionally, taking rock samples from the reservoir and performing suitable laboratory studies is required to get these crucial reservoir properties. Despite the fact that kr is a function of fluid saturation, it is now well established that pore shape and distribution, absolute permeability, wettability, interfacial tension (IFT), and saturation history all influence kr values. These rock/fluid characteristics vary greatly from one reservoir region to the next, and it would be impossible to make kr measurements in all of them. The unsteady-state approach was used to calculate the relat
... Show MoreThis research study experimentally the effect of air flow rate on humidification process
parameters. Experimental data are obtained from air conditioning study unit T110D. Results obtained
from experimental test, calculations and psychometrics software are discussed. The effect of air flow rate
on steam humidification process parameters as a part of air-conditioning processes can be explained
according to obtained results. Results of the steam humidification processes (1,2) with and without
preheating with 5A and 7.5A shows decreasing in dry bulb temperature, humidity ratio, and heat add to
moist air with increasing air flow rate, but humidification load, and total energy of moist air increase with
increasing air flo
It is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More