An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH and
... Show MoreOne of the most important enhanced oil recoveries methods is miscible displacement. During this method preferably access to the conditions of miscibility to improve the extraction process and the most important factor in these conditions is miscibility pressure. This study focused on establishing a suitable correlation to calculate the minimum miscibility pressure (MMP) required for injecting hydrocarbon gases into southern Iraq oil reservoir. MMPs were estimated for thirty oil samples from southern Iraqi oil fields by using modified Peng and Robinson equation of state. The obtained PVT reports properties were used for tunning the equation of state parameters by making a match between the equation of state results with experimenta
... Show MoreIn this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe
... Show MoreThe impact of a Schiff base namely 2-((thiophen-2-ylmethylene)amino)benzenethiol to corrode mild steel in 1 M HCl resolved was evaluated using different weight loss technique and scanning electron microscopy (SEM).different weight measurements to expand that the 2-((thiophen-2-ylmethylene) amino) benzenethiol inhibits the corrosion of mild steel through adsorbing of top for mild steel and block the active locality. The inhibitive impacts of 2-((thiophen-2-ylmethylene)amino)benzenethiol increase with increasing concentration and decrease with increasing temperature. SEM to checking revealed that the alloy surface was quite unaffected and formed protective film on its surface. The investigated
... Show MoreWith a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreSteel-concrete-steel (SCS) structural element solutions are rising due to their advantages over conventional reinforced concrete in terms of cost and strength. The impact of SCS sections with various core materials on the structural performance of composites has not yet been fully explored experimentally, and in this work, both slag and polypropylene fibers were incorporated in producing eco-friendly steel-concrete-steel composite sections. This study examined the ductility, ultimate strength, failure modes, and energy absorption capacities of steel-concrete-steel filled with eco-friendly concrete, enhanced by polypropylene fiber (PPF) to understand its impact on modern structural projects. Eco-friendly concrete was produced by the partial
... Show More