MJ Abbas, AK Hussein, Journal of Physical Education, 2019
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Background: The efficacy of educational strategies is crucial for nursing students to competently perform pediatric procedures like nasogastric tube insertion. Specific Background: This study evaluates the effectiveness of simulation, blended, and self-directed learning strategies in enhancing these skills among nursing students. Knowledge Gap: Previous research lacks a comprehensive comparison of these strategies' impacts on skill development in pediatric nursing contexts. Aims: The study aims to assess the effectiveness of different educational strategies on nursing students' ability to perform pediatric nasogastric tube insertions. Methods: A pre-experimental design was employed at the College of Nursing, University of Baghdad, i
... Show MoreHydrogen fuel is a good alternative to fossil fuels. It can be produced using a clean energy without contaminated emissions. This work is concerned with experimental study on hydrogen production via solar energy. Photovoltaic module is used to convert solar radiation to electrical energy. The electrical energy is used for electrolysis of water into hydrogen and oxygen by using alkaline water electrolyzer with stainless steel electrodes. A MATLAB computer program is developed to solve a four-parameter-model and predict the characteristics of PV module under Baghdad climate conditions. The hydrogen production system is tested at different NaOH mass concentration of (50,100, 200, 300) gram. The maximum hydrogen produc
... Show More
For desulfurization of naphtha, NaY zeolite was prepared from Dewekhala kaolin clay (Al-Anbar region). For the prepared zeolite adsorbent, x-ray diffraction, sodium content, silica to alumina ratio, surface area, bulk density and crushing strength were determined. From the x-ray diffraction of the prepared NaY zeolite and by a comparison with the standard NaY zeolite, it was found that the prepared adsorbent in this work has approximately the same crystal structure as the standard. Adsorption process was done in a laboratory unit at 25
... Show MoreIn this paper we introduce a brief review about Box-Jenkins models. The acronym ARIMA stands for “autoregressive integrated moving averageâ€. It is a good method to forecast for stationary and non stationary time series. According to the data which obtained from Baghdad Water Authority, we are modelling two series, the first one about pure water consumption and the second about the number of participants. Then we determine an optimal model by depending on choosing minimum MSE as criterion.
Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show More