Water injection equipments such as pipelines, which are used in the second recovery of oil in the Al-Ahdeb wells, suffer from the corrosion in water during maintaining vacuum deoxygenated tower that used to decrease concentration of the dissolved oxygen gas in the water from 6.2-9.1 ppm to o.5 ppm. This study involved calculation the corrosion rates of the internal surfaces of the pipelines either during operation of the vacuum unit or when the tower out of operation. Finally, find the solution by one of the following suggestions. In the first suggestion removal of the dissolved O2 from water is achieved by increasing the dosage of the oxygen scavenger (sodium sulphite). The second suggestion involves re
... Show MoreWater injection equipments such as pipelines, which are used in the second recovery of oil in the Al-Ahdeb wells, suffer from the corrosion in water during maintaining vacuum deoxygenated tower that used to decrease concentration of the dissolved oxygen gas in the water from 6.2-9.1 ppm to o.5 ppm. This study involved calculation the corrosion rates of the internal surfaces of the
pipelines either during operation of the vacuum unit or when the tower out of operation. Finally, find the solution by one of the following suggestions. In the first suggestion removal of the dissolved O2 from water is achieved by increasing the dosage of the oxygen scavenger (sodium sulphite). The second suggestion involves removing the dissolved O2 from w
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreIraq within the ranks of the fledgling communities characterized by a broad base of the population pyramid, because they pose the age group (under 15 years) of a large proportion of the community, as it exceeded the proportion (40%) during the years of research extended (1986-2010) Despite the relative decline in the rates fertility during that period, but the proportion of young people remained high, especially for groups of at least five years, amounting to about 14% in 2012, a little more than the proportion of what constitutes age group (5-9 above) years, where it was (13%) and this naturally predicts continuing population increases in coming decades, due to the entry of those numbers of individuals in the reproductive stage,
... Show MoreThis work is the first study of the Curculionoidea fauna from Kurdistan region of Iraq, based on the intensive survey in different localities of Kurdistan from March 2016 to November 2017. In total, 41 species belonging to 28 genera, 21 tribes and 3 families were collected and identified, including 25 species newly recorded for the Iraqi fauna.
General distribution, collecting localities and methods, with plant association data for each species are given.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show MoreIn this study, composite materials were prepared using unsaturated polyester resin as binder with two types of fillers (sawdust and chopped reeds). The molding method is used to prepare sheets of UPE / sawdust composite and UPE / chopped reeds composite. The mechanical properties were studied including flexural strength and Young's modulus for the samples at normal conditions (N.C). The Commercial wood, UPE and its composite samples were immersed in water for about 30 days to find the weight gain (Mt%) of water for the samples, also to find the effect of water on their flexural strength and Young's modulus. The results showed that the samples of UPE / chopped reeds composite gained highest values of flexural strength (24.
... Show MoreThe researcher [1-10] proposed a method for computing the numerical solution to quasi-linear parabolic p.d.e.s using a Chebyshev method. The purpose of this paper is to extend the method to problems with mixed boundary conditions. An error analysis for the linear problem is given and a global element Chebyshev method is described. A comparison of various chebyshev methods is made by applying them to two-point eigenproblems. It is shown by analysis and numerical examples that the approach used to derive the generalized Chebyshev method is comparable, in terms of the accuracy obtained, with existing Chebyshev methods.
Liquid membrane electrodes for the determination iron(III) were constructed based on chloramphenicol sodium succinate and iron(III) CPSS-Fe(III) as ion pair complex, with four plasticizers Di-butyl phosphate (DBP); Di-butyl phthalate (DBPH); Di-octyl phthalate (DOP); Tri-butyl phosphate (TBP); in PVC matrix . These electrodes give Nernstian and sub-Nernstian slopes (19.79, 24.60, 16.01 and 13.82mV/decade) and linear ranges from (1x10-5-1x10-2 M, 1x10-5-1x10-2 M, 1x10-6-1x10-2 M and 1x10-5-1x10-2 M) respectively. The best electrode was based on DBP plasticizer which gave a slope 19.79 mV/decade, correlation coefficient 0.9999, detection limit of 9×10-6 M, lifetime 37 day displayed good stability and reproducibility and used to determine
... Show More