An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe nanocomposite on the base of synthesis Copper iodide
nanoparticles and polyvinyl alcohol (PVA/CuI) with different
concentration of CuI were obtained using casting technique.
PVA/CuI polymer composite samples have been prepared and
subjected to characterizations using FTIR spectroscopy, The FTIR
spectral analysis shows remarkable variation of the absorption peak
positions with increasing CuI concentration. The obtained results by
X-ray diffraction indicated the formation of cubic CuI particles. The
effects of CuI concentrations on the optical properties of the PVA
films were studied in the region of wavelength, (190-1100) nm.
From the derivation of Tauc's relation it was found that the direct
allowed t
High temperature superconductor with nominal composition Bi1.6Pb0.4Sr1.8Ba0.2Ca2 Cu3O10+? was prepared by solid state reaction method. Two sets of samples have been prepared .The first one was quenched in air; the second set was quenched in liquid nitrogen. X-ray diffraction analyses showed an orthorhombic structure with two phases, high –Tc phase (2223) and low-Tc phase (2212) in addition to that impure phase was found. It has been observed that quenched in air samples display a sharp superconducting transition and a higher-Tc phase than that of the quenched in liquid nitrogen samples.
This work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conduct
... Show MoreIn this work, results of a mathematical analysis of the role of workpiece preheating in laser keyhole welding were presented. This analysis considered the steady-state welding as well as certain range of boundary conditions over which preheating effect would be indicated. This work is an attempt to interpret the role of preheating to increase welding depth and perform keyhole welding with high quality using physical and thermal properties of steel alloys.
Abstract
The entities responsible for regulating the financial market are seeking to provide high quality accounting information, to provide appropriate protection to investors, and thus encourage them and attract them to increase their investments. the research reached several conclusion, the most prominent of which comes :-
1-The production of high quality accounting information reduces investment costs and costs of processing accounting information.
2- The production of high quality accounting information helps investors identify the best investment opportunities.
3- The results of the statistical analysis showed that there is significant
... Show MoreThis study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More
