The risk assessment for three pipelines belonging to the Basra Oil Company (X1, X2, X3), to develop an appropriate risk mitigation plan for each pipeline to address all high risks. Corrosion risks were assessed using a 5 * 5 matrix. Now, the risk assessment for X1 showed that the POF for internal corrosion is 5, which means that its risk is high due to salinity and the presence of CO, H2S and POF for external corrosion is 1 less than the corrosion, while for Flowline X2 the probability of internal corrosion is 4 and external is 4 because there is no Cathodic protection applied due to CO2, H2S and Flowline X3 have 8 leaks due to internal corrosion so the hazard rating was very high 5 and could be due to salinity, CO2, fluid flow rate
... Show MoreThe aim of this paper is to measure the characteristics properties of 3 m radio telescope that installed inside Baghdad University campus. The measurements of this study cover some of the fundamental parameters at 1.42 GHz. These parameters concentrated principally on, the system noise temperature, signal to noise ratio and sensitivity, half power beam width, aperture efficiency, and effective area. These parameters are estimated via different radio sources observation like Cas-A, full moon, sky background, and solar drift scan observations. From the results of these observations, these parameters are found to be approximately 64 K, 1.2, 0.9 Jansky, 3.7°, 0.54, and 3.8 m2 respectively. The parameters values have vital affect to quantitativ
... Show MoreDoppler broadening technique is suggested to monitor the development of tumours. It depends on the sensitivity of positronium (Ps) annihilation parameters to the sub- microstructural changes in biological tissues. This technique uses high resolution HpGe detector to measure the lineshape parameters (S and W) in normal mice's mammary tissues and adenocarcinoma mammary tissues as a function of tumour growth. The results demonstrate that the central parameter (S) decreases and the wing parameter (W) increases as the tumour grow. It is found that the S parameter changes considerably with the distribution of voids which are affected by the tumour development. Therefore the present technique can successfully be employed to monitor the developm
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys) of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreBackground: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations.
Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase t
... Show MoreBackground: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations. Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase type 2 (rs225013 and rs225014) and le
... Show MoreThe aquatic crude extract of Silybum marianum dry grains prepared by melting them in distil water by the method of soak and shake. The effect of Silybum marianum crude extract studied in vitro on three tumor cell line the Hep-2, AMN-3 and RD for 24, 48 and 72 hours of exposure, and one cell line of normal cells REF for 72 hr exposure. The results showed that the prescence of toxic effect of the aquatic crude extract on the cell lines of Hep-2, AMN-3 and RD at 10 and 100 µg/ ml upto the higher concentrations when they exposed to the extract for 48 hr. as compared with the control treatment, and when the exposure period increased to 72 hr. the toxic effect started at low concentrations (5 and 10 µg/ ml) as compared with the control g
... Show More