The steel industry sector is witnessing an obvious growth in most worldwide nations and gulf countries. We wish that Iraq would be one of these superiors that go on along field to develop the construction industry in Iraq. Hence we need to notify that the government attention should be equivalent to the importance of steel industry and other industries would depend on this one, it should be presented the full support to the general sector, which is represented by ministry of industry and its institutions throughout the suitable legislation and facilities for the private companies are already into that, and they might record progress in this field. this study aims to use scrap steel as raw materials in manufacturing iron steel such war remains, tanks remain, broken trucks spread wide Iraq. this should be done by constructing new plants in new technology all over Iraq besides reconstructing old plants as was done in Khor al-Zubair factory in Basrah, forming a plan to develop work horizons in this field toward reconstruction. Some Muslims believe due to this verse that iron was sent from heaven and they link that to what mentioned in the scientific theories that iron was not available on the globe million years ago , that it reached to the earth through meteors during earth formation and evolution .because of low cost and its strength , iron became indispensable in engineering applications such as reinforcement steel of different building ,horizontal and vertical types ,besides all machines ,cars , and ships bodies ,besides the metal frames of giant buildings. Pure iron is not used due to being plastic so that its alloys like steel alloy. commercially, iron is classified as its purity and alloy component availability. Pig iron contains 3.5-4.5% carbon, with different quantities of impurities such as sulfur, silicon, and phosphorous. The pig iron is not a final product to sell; it is a middle step of producing the cast iron and steel iron of iron rows. Aims of this research are to put a development mechanism to reopening iron factories in our country the cradle of civilizations to rebuild it and list it beside high technology, industry and commercial countries by presenting solutions and quality control to reduce faults in product iron to answer needs of national market. Due to all, we need to re-frame constructing steel iron factories in the construction industry without needing to import that from other countries in addition to the future vision of horizontal expansion to export steel iron after getting local markets needs fulfilled.
In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin
... Show MoreThe goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreNaproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende
... Show MoreThe interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.
Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around. The wide application of these cameras, pushed thieves to seek new ways for abolition of the surveillance system and digital recording of events, such as cutting the signal wire between the camera and Digital video recorder or changing the direction of the camera away from the focus spot or damaging the camera or steal the device which means the loss of the recorded media. This paper focuses on such abolitions and fixed it by suggesting a way to notify the administrator immediately and automatically by Email about any violation of the system using MATLAB, whic
... Show MoreAbstract
The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More