In this study , Iraqi Bentonite clay was used as a filler for polyvinyl chloride polymer. Bentonite clay was prepared as a powder for some certain particle size ,followed by calcinations process at (300,700,900) OC ,then milled and sieved. The selected sizes were D ~75 µm and D ~150. After that polyvinyl Al-Cohool solution prepared and used as a coated layer covered the Bentonite powder before applied as a filler ,followed by drying , milling and sieving for limited recommend sizes. polyvinyl chloride solutions were prepared and adding of modified Bentonite power at certain quantities were followed .Sheet of these variables on the mechanical and thermal properties of the prepared reinforced particular polyvinyl chloride composite Experimentally, it was found that the composite prepared by adding modified Iraqi Bentonite powder , that calcined at 700 oC as a filler have an advantage in heating insulator properties by 30 from that found for PVC as it is ,and the value of stress strength exceed by three times as that for original value.
In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss
... Show MoreThe great importance of training made it as an investment for the organization, and assert the Quality of performance which support it by prepare the employee to the Current and future Jobs . The Research problem a rounded about How to measure the impact of training based on (ISO 10015) and its effect on the Quality of performance , How to evaluation the results of training to attained the training goals . The Research aims to find out the effects of application of international standard guidelines (ISO 10015) to attained the quality of audit work achieved in the Federal Board of Supreme Audit. The Research sought to achieve a number of objectives cognitive and applied on the basis of four key assumptions, and other su
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More