Preferred Language
Articles
/
bRaRGIcBVTCNdQwCgTYa
Studying the Effects of Different Polymers on Rheological Properties of Water Base Muds
...Show More Authors

This research is focusing on finding more effective polymers that leads to enhance the rheological properties of Water Base Muds. The experiments are done for different types of mud for all substances which are Polyacrylamide, Xanthan gum, CMC (Carboxyl Methyl Cellulose). This study shows the effect of add polymer to red bentonite mud, effect of add polymer to Iraqi bentonite mud, the effect of add bentonite to polymer mud. The mud properties of Iraqi bentonite blank are enhanced after adding the polymers to the blank mix, CMC gives the highest value of plastic viscosity and Gel strength than others; X-anthan gives the highest value of yield point and gel strength than others. For the red bentonite mud, Polyacrylamide has the highest shear stress and yield point than the others polymers, but Xanthan has the highest effect on plastic viscosity than other polymers. All polymers reduce filtration loss. The polymer solution mud failed to suspend the barite so we cannot use it as drilling fluid even so this mud has good Rheological properties (PV and YP). The maximum amount of each polymer is founded for the studied clay types.                                                             

Crossref
View Publication
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
work alienation and its impact on Job Satisfaction Applied Research
...Show More Authors

The research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Temperature Stress on Physiological and Morphological Traits in Rhizophora apiculata
...Show More Authors

Global warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on Cosmetic Products Marketed in Iraq: Microbiological Aspect
...Show More Authors

Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants   in   cosmetic   products   include bacteria such as Staphylococcus, Pseudomonas, Klebsiella,   Achromobacter   and   Alcaligenes. Contaminated water  is  a  likely  source  of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser,  and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated.    Most of the contamination was from bacteria and no fungal contamination was detected.  The highest level o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref