The present paper analyzes the signal emitting from the Reticle during changing the spot size of laser falling on the disk and shows the optimum frequency and the amount of energy window in different patterns of modulator (Reticle). All results are obtained by establishing a special program named “Disk optical modulator version 3" using the language visual basic 6 ahich contains many parameters. All models of optical modulator consist of twenty sectors, ten sectors are opaque and other ten sectors are transmitted for the laser. The number of sectors depends on several factors as chopping frequency, power transparent and modulation transfer function. It has been demonstrated by simulations, the optimal
... Show MoreThis study investigates the potential of biogas recovery from used engine oil (UEO) by co-digestion with animals’ manure, including cow dung (CD), poultry manure (PM), and cattle manure (CM). The experimental work was carried out in anaerobic biodigesters at mesophilic conditions (37°C). Two groups of biodigesters were prepared. Each group consisted of 4 digesters. UEO was the main component in the first group of biodigesters with and without inoculum, whereby a mix of UEO and petroleum refinery oily sludge (ROS) was the component in the second group of biodigesters. The results revealed that for UEO-based biodigesters, maximum biogas production was 0.98, 1.23, 1.93, and 0 ml/g VS from UEO±CD, UEO±CM, UEO±PM, and U
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.
The banking industry, as a result of the great challenges it faced, required continuous development of the principles of management, control and mechanisms used. The Basel Committee on Banking Supervision has played a leading role in legalizing many of these developments and has been able to contribute significantly to establishing a common framework for banking supervision, The central role in the various countries of the world is based on coordination between the various regulatory authorities and thinking about finding mechanisms to confront the risks faced by banks, recognizing the importance of the banking sector in the stability of domestic and international banking systems or the danger of this sector in the emergence of F
... Show MoreAbstract
The research aims to identify the nature of the relationship between the level of debt used and economic value added of companies listed on the Iraq Stock Exchange under the Contrast sizes of these companies , The research addressed the theoretical concepts associated with each of the debt financing , economic added value and Organization size With the use of financial techniques in the practical side to measure these variables, The research community Represent of the shareholding companies listed on the Iraq Stock Exchange with a choice of intentionally sample of 24 joint stock companies representing 
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThis study investigates the treatment of used lubricating oils from AL-Mussaib Gas Power Station Company-Iraq, which was treated with different extractive solvents (heptane and 2-propanol). The performance activity of these solvents in the extraction process was examined and evaluated experimentally. Operating parameters were solvent to oil ratios of (1:2, 1:4, 1:6, and 1:8), mixing time (20, 35, 50, and 65 min), temperatures (30, 40, 50, and 60 ºC), and mixing speed (500 rpm). These parameters were studied and analyzed. The quality is determined by the measuring and assessment of important characteristics specially viscosity, viscosity index, specific gravity, pour point, flash point, and ash content. The results confirm that the
... Show More