This paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.
The present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w
... Show MoreIn this paper, turbidimetric and reversed-phase ultra-fast liquid chromatography (UFLC) methods were described for the quantitative determination of ephedrine hydrochloride in pharmaceutical injections form. The first method is based on measuring the turbidimetric values for the formed yellowish white precipitate in suspension status in order to determine the ephedrine hydrochloride concentration. The suspended substance is formed as a result of the reaction of ephedrine hydrochloride with phosphomolybdic acid which was used as a reagent. The physical and chemical characteristics of the complex were investigated. The calibration graphs of ephedrine were established by turbidity method. While the second method (UFLC) was conducted using the
... Show MorePurpose This study was design to investigate of Purpose This study was design to investigate of P. aeruginosa, an example of Gram-negative bacteria, in seven primary and secondary schools of Baghdad city, and the effects of Ethanol and Dettol of P. aeruginosa biofilm. Design/methodology/approach Seventy swabs were collected from seven primary and secondary schools of Baghdad city, Iraq, during November -December 2022. Swabs were collected from classes desk, doors handles, students hands and water taps. Standard microbiological testing methods were used on the samples for isolation and identification. The ability of bacteria to form biofilm and the effects of Ethanol and Dettol on “preformed” biofilms was examined by microtiter plate wi
... Show MoreIn this paper, silicon carbonitried thin films were prepared by the method of photolysis of the silane (SiH4) and ethylene (C2H4) gases, with and without ammonia gas (NH3), which is represented by the ratio between the (PNH3) and (PSiH4 + PC2H4 + PNH3), (which assign by the letter X), X has the values (0, 0.13, 0.33). This method carried out by using TEA-CO2 laser, on glass substrate at (375 oC), deposition rate (0.416-0.833) nm/pulse thin film thickness of (500-1000) nm. The optical properties of the films were studied by using Absorbance and Transmittance spectrums in wavelength range of (400-1100) nm, the results showed that the electronic transitions is indirect and the energy gap for the SiCN films increase with increasing of nitrog
... Show MoreImage Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreThe measurements of major and trace elements in different brands of milk powder selected from the Iraqis market via the X-ray fluorescence (XRF) Technique have been studied in the present work. The result of the measurements reveals the high concentrations of sodium, phosphorus, sulfur, chlorine, potassium, calcium and magnesium. Furthermore, low concentrations of aluminum, silicon, iron, bromine, molybdenum, iodine, barium, titanium, manganese, cobalt, chrome, nickel, copper, zinc and lead were detected. Neutron activation analysis (NAA) and Kjeldahl technique were also employed to determine the concentrations of nitrogen. It was found that the nitrogen concentration was in the range of (1.96 - 3.23) % which is within the permissible li
... Show MoreIn the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More