In the present work, the efficiency of Tri-octyl Methyl Ammonium Chloride (TOMAC) ionic liquid was investigated as new and green demulsifier for three types of Iraqi crude oil emulsions (Nafut Khana (NK), Kirkuk and Basrah). The separation efficiency was studied at room temperature and by using microwave heating technique. Several batch experiments were done to specify the suitable conditions for the emulsification and demulsification which were specified as 45 minutes and 3000 rpm for crude oil emulsification while the ionic liquid doses were (500,300,150,50) ppm and the conditions of microwave heating were 1000 watt and 50 second as irradiation time. The results were very encouraging especially for NK and Kirkuk crude oil emulsions where the separation efficiency was between (100%-95%) in both cases (by microwave heating and at room temperature demulsification). The separation percentages of Basrah crude emulsion varied but as a general result, the efficiency was acceptable for high doses at the same time, while for low doses, the water removal ratio was not good as the previous one.
Background In rheumatoid arthritis, your immune system attacks the tissue lining the joints on both sides of your body. Other parts of the body may also be affected. Unsure of the exact cause. Two separate genes termed IL12A (p35) and IL12 encode the heterodimeric cytokine known as IL12 (p40). Several different hematopoietic cell types can have several different hematopoietic cell types that can generate antigen-presenting cells (APCs), including DCs and macrophages. Objectives This study aimed to investigate if the interleukin IL-12B gene's common polymorphisms in an Iraqi population were associated with RA. Material and methods Blood samples were taken from 70 Iraqi patients with RA illnesses and 30 Iraqi controls during the periods from
... Show MoreThe aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Gr
... Show MoreForensic accounting (FA) is an important tool in exposing financial manipulation and corruption within institutions, making the role of FA essential in the Iraqi judicial system (IJS). This role suffers from limited implementation due to the lack of specialized legislation and insufficient awareness of its importance. The role of FA in the IJS can be enhanced by enhancing professional training, amending university curricula to include FA, and developing legislation regulating this field. Furthermore, cooperation between courts and the FA should be strengthened to ensure adequate financial evidence (FE) in judicial cases. For example, the experiences of developed countries, such as the United States and the United Kingdom, demonstrate how FA
... Show MoreCervical carcinoma represent the second predominant cancer in female and there is a strong correlation between cervical cancer and the infection with high-risk types of HPV and expression the viral oncogenes. EMT is viewed as a vital advance in carcinoma development and ensuing metastasis. To evaluate correlation between the expression of Twist and HPV16 infection in a group of Iraqi patients with cervical carcinoma. A total of forty paraffin blocks included in this study which were divided into 30 sample of cervical cancer infected with HPV16and 10 sample of normal cervical tissues. The samples were subjected to immunohistochemical technique using Anti-Twist2 polyclonal antibody. The obtained data from this study indicate that majority of
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators