The corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range ( 303 –343 )K, at pH ( 4 ) and at pH (4,6,7,9,11 ) at (343K)..The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature, the corrosion current density (icorr) decreased with increasing pH in the rang ( 4 – 7 ) and it increased with increasing pH in the rang ( 9 – 11 ) at ( 343 K ), while the corrosion potential generally variation with increasing pH in the rang (4-11)at(343K. From the general results for this study can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )
BACKGROUND: Sickle cell nephropathy, a heterogeneous group of renal abnormalities resulting from complex interactions of sickle cell disease (SCD)-related factors and non-SCD phenotype characteristics, is associated with an increased risk for morbidity and mortality. AIMS: The aims of this study were to determine the frequency of microalbuminuria (MA) among pediatric patients with SCD and to determine risk factors for MA among those patients. SUBJECTS AND METHODS: A case–control study was carried out on 120 patients with SCD, 2–18 years old, registered at Basrah Center for Hereditary Blood Diseases, and 132 age-and sex-matched healthy children were included as a control group. Investigations included complete blood panel, blood urea, se
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreWe introduce in this paper some new concepts in soft topological spaces such as soft simply separated, soft simply disjoint, soft simply division, soft simply limit point and we define soft simply connected spaces, and we presented soft simply Paracompact spaces and studying some of its properties in soft topological spaces. In addition to introduce a new types of functions known as soft simply
Iraq faces significant economic challenges, owing in part to its reliance on oil revenue and the country's overburdened public sector. The supremacy of State-Owned Enterprises (SOEs), obstructive rules, a lack of access to finance, a shortage of skilled labor, and inadequate infrastructure all impede private sector growth. This research relied mainly on information from global development organizations, most markedly the World Bank, as well as policy documents, and it discovered a scarcity of pertinent educational writings. The following are the key findings of this research: Recent economic growth has not resulted in poverty reduction; the stretched history of war and insecurity in Iraq has hampered progress and development; the private se
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreIn this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).