In this research paper, two techniques were used to treat the drill cuttings resulting from the oil-based drilling fluid. The drill cuttings were taken from the southern Rumaila fields which prepared for testing and fixed with 100 gm per sample and contaminated with two types of crude oil, one from Rumaila oilfields with Sp.gr of 0.882 and the other from the eastern Baghdad oilfield with Sp.gr of 0.924 besides contamination levels of 10% and 15% w/w in mass. Samples were treated first with microwave with a power applied of 540 & 180 watts as well as a time of 50 minutes. It was found that the results reached below 1% w/w in mass, except for two samples they reached below 1.5% w/w in mass. Then, the sample of 1.41% w/w in mass, which has the highest contamination level after microwave treatment, was treated on three groups of earthworms. After the appropriate conditions, samples were prepared for treating by earthworms and for an incubation period of 21 days, the results highlighted the effectiveness of the succession process by reaching concentrations below 0.92%, 0.65%, and 0.42% w/w in mass.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreThe condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show MoreIn the light of the globalization Which surrounds the business environment and whose impact has been reflected on industrial economic units the whole world has become a single market that affects its variables on all units and is affected by the economic contribution of each economic unit as much as its share. The problem of this research is that the use of Pareto analysis enables industrial economic units to diagnose the risks surrounding them , so the main objective of the research was to classify risks into both internal and external types and identify any risks that require more attention.
The research was based on the hypothesis that Pareto analysis used, risks can be identified and addressed before they occur.
... Show MoreThe Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn this contribution, density functional theory-based calculations have been carried out to assess the electronic, photocatalytic and optical properties of Ce1-xTixO2 system. Ti incorporation leads to a decrease of Ce 4f states and enhancement of Ti 3d states in the bottom of conduction band. Furthermore, it was found that doping ceria with Ti-like transition metals could evidently shift the absorption of pure CeO2 towards higher wavelength range. These findings can provide some new insights for designing CeO2-based photocatalysts with high photocatalytic performance. To the best of our knowledge, this investigation calculates Mullikan’s charge transfer of Ce1-xTixO2 system for the first time. Charge transfer reveals an ionic bond between
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This research aims at investigating pupils’ ability in using discourse markers which are identified in the English textbooks of secondary schools. Four texts are chosen from third intermediate class. The four texts are short stories of different topics.
This research hypothesizes that there are no statistical significant differences among Iraqi intermediate pupils’ ability in using textual
... Show More