The corrosion behavior of carbon steel at different Temperatures and in water containing different sodium chloride
concentrations under 3 bar pressure has been investigated using weight loss method . The carbon steel specimens were
immersed in water containing (100,400,700,1000PPM) of NaCl solution and under temperature was increased from
(90-120ºC) under pressures of 3 bar. The results of this investigation indicated that corrosion rate increased with NaCl
concentrations and Temperature.
Kinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics,
... Show MoreThe detection of fungi contaminating maize grain and the effect of four plant extracts Azadirachta indica, Eucalyptus globulus Glycyrrhiza glabra and Zingiber officinale on the growth of A. flavus and its ability to produce AflatoxinB1. The results showed that the incidence of Aspergillus spp., was 52.75% of the isolated fungi, of which 29.50% was due to Aspergillus flavus, followed by Penicillium spp., with an incidence of 21.06%, and then Fusarium spp., with a rate of 18.13%. The percentage of toxin-producing A. flavus isolates reached 70.8% out of 24 isolates. The results showed the effect of alcoholic plant extracts at a concentration of 10 mg/ml on the fungal growth activity of A. flavus, the alcoholic extract of neem leaves was superi
... Show MoreDue to the great losses caused by weeds to the crop, it is necessary to continue testing new herbicides that may be more efficient than the herbicides used that can reduce competition between weeds and crops, Therefore, a field experiment was carried out in the experimental field of the Department of Field Crops, College of Agricultural Engineering Sciences, University of Baghdad (Al-Jadriya) during the winter season of 2021-22 in order to evaluate the efficiency of the herbicide H-199 and compare it with some herbicides used in controlling companion weed to three cultivars of wheat and its effect in the yield and its components. The experiment was applied according to the randomized complete block design with split-plot arrangement
... Show MoreThis study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
Straight tendons in pretensioned members can cause high-tensile stresses in the concrete extreme fibers at end sections because of the absence of the bending stresses due to self-weight and superimposed loads and the dominance of the moment due to prestressing force alone. Accordingly, the concrete tensile stresses at the ends of a member prestressed with straight tendons may limit the service load capacity of the member. It is therefore important to establish limiting zone in the concrete section within which the prestressing force can be applied without causing tension in the extreme concrete fibers. Two practical methods are available to reduce the stresses at the end sections due to the prestressing force. The first method based
... Show MoreTraining and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).
Helicobacter pylori (HP) is the etiopathogenic agent of gastric and duodenal disorders ranging from gastritis to malignancy. It is also associated with many extraintestinal diseases, including cardiovascular disease and its associated risk factors. To evaluate the link between HP infection and some cardiovascular risk factors by studying the effects of HP infection on body mass index, blood pressure, and serum lipid profile among patients having gastritis with and without HP infection. A crosssectional study included 1214 patients who had gastritis diagnosed by gastroscopy examination. Those patients were in the age range of 30-65 years and they were divided according to their gender into 725 females and 489 males depending on the 1
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More