The elections of the Council of Representatives in Iraq are one of the manifestations of political participation, which makes it attracts the attention of researchers. Where Iraq witnessed in 2005 important political events in the Iraqi arena, a pluralist parliamentary elections or elections in Iraq by direct free election on January 30, the first almost half a century ago. On November 15 of the same year, Iraq adopted a permanent constitution for the country through a popular referendum.
The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.
The optimum separators operating pressure is determined by using flash calculations and equilibrium ratios. In this study, the optimum separator size for Jambur field is calculated by using equations introduced by Arnold and Stewart and API12J Specification [1]. Because Jambur field has a high production rate two conditions are taken in the study to determine separator size, first based on production rate 80,000 bbl/day and second based on split the production between two banks A and B (40,000 bbl/day for each bank). The calculation resulted in optimum separator pressure for the first stage of 700 psi, and the second stage of 300 psi, and the third stage of 120 psi. The results show that as the number of stages increased above three-stag
... Show MoreGelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .
A good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show MoreWe study clusters in warm dark matter (WDM) models of a thermally produced dark matter particle 0.5 keV in mass. We show that, despite clusters in WDM cosmologies having similar density profiles as their cold dark matter (CDM) counterparts, the internal properties, such as the amount of substructure, show marked differences. This result is surprising as clusters are at mass scales that are a thousand times greater than that at which structure formation is suppressed. WDM clusters gain significantly more mass via smooth accretion and contain fewer substructures than their CDM brethren. The higher smooth mass accretion results in subhaloes which are physically more extended and less dense. These fine-scale differences can be probed by strong
... Show MoreHigh performance work systems and general industrial enterprise performance
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreImage pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show Moreole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show More