Good governance of service quality through the adoption of sustainable energy the study of A1- Karkh historic center of in Baghdad city
The varied thermal conductivity (insulation) of silica aerogel with heating for different pH has been investigated, it has been depended on ambient pressure drying method in the preparing silica aerogel samples, also six different pH of samples (1, 2, 3, 7, 8 and 9) were treated under five degree of heating with (50,100,150,200 and 250) ᴼC. This technique is important to test the carry-outs hydrophobic silica to temperature without high-quality material changes in the basic characteristics. The hot-wire technique is used in this work to examine the thermal conductivity, Fourier Transform Infrared Spectroscopy (FTIR) depended to characterize the bonds and their artificial by heating. Resu
... Show MoreTin Selenide (SnSe) Nano crystalline thin films of thickness 400±20 nm were deposited on glass substrate by thermal evaporation technique at R.T under a vacuum of ∼ 2 × 10− 5 mbar to study the effect of annealing temperatures (as-deposited, 100, 150 and 200) °C on its structural, surface morphology and optical properties. The films structure was characterized using X-ray diffraction (XRD) which showed that all the films have polycrystalline in nature and orthorhombic structure, with the preferred orientation along the (111) plane. These films was synthesized of very fine crystallites size of (14.8-24.5) nm, the effect of annealing temperatures on the cell parameters, crystallite size and dislocation density were observed.
... Show MoreThis work studies with produce of light fuel fractions of gasoline, kerosene and gas oil from treatment of residual matter that will be obtained from the solvent extraction process as by product from refined lubricate to improve oil viscosity index in any petroleum refinery. The percentage of this byproduct is approximately 10% according to all feed (crude oil) in the petroleum refinery process. The objective of this research is to study the effect of the residence time parameter on the thermal cracking process of the byproduct feed at a constant temperature, (400 °C). The first step of this treatment is the thermal cracking of this byproduct material by a constructed batch reactor occupied with control device at a selective range of re
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreIn this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreRotating blades are the important parts in gas turbines. Hence, an accurate mathematical estimation (F.E.M) of the stresses and deformations characteristics was required in the design applications to avoid failure. In recent year’s there are researchers interest in the effect of temperature on solid bodies has greatly increased, The main of this study investigated the thermal and rotational effects. So, the thermal stresses due to high pressure and temperature are studies, also determine the steady state stresses and deformations of rotating blades due to mechanical effect. Many parameters such as thickness and centre of rotating are investigated in this paper. The
... Show More