The aim of this research is to benefit from recycl the aircraft waste oils which is discarded in sewage network, to be used in preparation of greases for industrial purposes and to reduce the environmental pollution. In this research synthetic greases were prepared with special specifications by mixing the waste oils after treating with (silica gel as adsorbent agent, and filtration to precipitate impurities then heated to 110 C? to get rid of water) bentonite produced in Iraq which is available and cheap with existence of high density polyethylene at specific conditions of ( heating and mixing) . The best weight proportion were reached, then paraffin wax and additives were added to improve the properties of grease and give the
... Show More
With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer
... Show MoreThe bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.
Use Almtafr axis to study the response component that isolates gave a positive response to the use of standard Almtafr which leads to lower the temperature and the number of cells at a temperature suitable Rifampicin resistant less than that TJ and similarly reflected on the frequency of mutations induced
تهدف الدراسة إلى استعراض ظهور كراسي اليونسكو في الجامعات العراقية والأنشطة التي تم تنفيذها لتحقيق أهداف التنمية المستدامة، حيث تم إنشاء كل كرسي لتحقيق أحد هذه الأهداف التي تركت أثرها على بعض القطاعات التعليمية والاجتماعية ، وبالتالي تنبع أهمية الدراسة من الحاجة إلى الإشارة إلى إنشاء كراسي اليونسكو في الجامعات العراقية والأنشطة التي عززت إنشائها ونشاطها ومبادراتها المحلية والدولية, وكذلك تحديد ما حقق
... Show MoreContemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreStabilization of phenol trapped by agricultural waste: a study of the influence of ambient temperature on the adsorbed phenol
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More