A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
The purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration,
The study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreThe semiotic trend of recent monetary trends task that took a wide range of attention of critics and readers alike, especially after the deployment, which accompanied him after widespread acts critic Grimas and powers applicable to the literary texts and is thus expanded its care circle, hence the choice of the novel (absent) woman Iraqi novelist (Mahdi ‘Issa falcon) model to be applied to the study chose to be a semiotic approach through the use of procedural mechanisms for its critical tool (Paris School of semiotics), cash and views of its founder critic Grimas.The research in the introduction and pave came we made it a vision for literary semiotic and its impact trend in cash and cash is and what it desire to clarify some poked suc
... Show MoreTwo novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreTo evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreFirst: People’s need for advocacy:
Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.
All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple
... Show MoreMany consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show More