The catalytic cracking of three feeds of extract lubricating oil, that produced as a by-product from the process of furfural extraction of lubricating oil base stock in AL-Dura refinery at different operating condition, were carried out at a fixed bed laboratory reactor. The initial boiling point for these feeds was 140 ºC for sample (1), 86 ºC for sample (2) and 80 ºC for sample (3). The catalytic cracking processes were carried out at temperature range 325-400 ºC and initially at atmospheric pressure after 30 minutes over 9.88 % HY-zeolite catalyst load. The comparison between the conversion at different operating conditions of catalytic cracking processes indicates that a high yield was obtained at 375°C, according to gasoline production. The distillation of cracking liquid products was achieved by general ASTM distillation (ASTM D -86) for separation of gasoline fraction up to 220 ºC from light cycle oil fraction above 220 ºC. According to gasoline production, it can be noticed that the condition of the feed with the lowest initial boiling point (80 ºC) (sample 3) made it gives more production of gasoline as compared with the other feeds (sample 1,2). At the best temperature (375 ºC), for the best feed for the production of gasoline (sample (3)), the production of gasoline + kerosene were 19.315, 16.16 and 12.95 wt.% for sample (2, 3 and 1). The RON for the gasoline produced from the catalytic cracking for the feed of the lowest initial boiling point was 92.3.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Abstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show MoreAbstract
The critical success factors of the means of the most modern in determining the main directions for organizations to achieve competitive advantage. and can be a critical success factors in organizations that overlap in the functional areas of the organization. that successful organizations use these factors to get to the uniqueness and distinction. as the entrance of critical success factors with the capacity Evaluative phase correction because discovery increases the perception of managers of what is important to the organization and using them to get to the Strategic Entrepreneurship. as it begins in terms of permanence of success and
... Show MoreThe Quality function deployment (QFD) tool is an important tool of total quality management because its a link between two important parts customer and production process of the product, using advanced House of quality, which contributed to provide more details about improving the product before it had a vision for the future of the product be improved. Also the identification of the two competitors (Alwazeer , Altouri) bases on the survey of retailers which they identified five competitors products (Alwazeer , Altouri , Ferry , Jif , Dina)for the product (Zahi). Then House of quality to product (Zahi) has been developed By using a Kano Model to classify of customer's requirements for the
... Show More