With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.
This study was aimed to estimate the influence of Conocarpus erectus L. residues, and some micronutrients on growth and production of potato. This research was conducted at one of the fields of the College of Agricultural Engineering Sciences - University of Baghdad. The experiment was implemented using factorial arrangement (4X3X3) within randomized complete block design with three replicates. Conocarpus fertilizer was represented the first factor with three levels (7.5, 15, 30 ton.ha-1), which symbolized (C2, C3, C4). Mineral fertilizer as recommended dose as a control, which symbolized (C1). The second factor was foliar spraying with three levels of iron (0, 100, 200 mg.L-1), which symbolized (F0, F1, F2). The third factor is fol
... Show MoreThe cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.
Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int
... Show MoreIn the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (for
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreThis study exposed to use the liquid whey (which was produced from of soft cheese processed) partially or completely instead of milk in fatty cake, this whey residue is still not used, instead it is thrown in rivers which effect different environment and economic problems. Different concentrations was used (25% , 50% , 75% , and 100%) of whey in baked cake , Volume , height and other different properties ( panel taste ) was studied too . Sensory evaluation results showed that an improved in all the character of the baked cake was happen by the used of 25% and 50% of the whey in comparison with the control treatment, the 75% replacement showed a decrease in appearance , texture and tenderness , while the degrees of color and fla
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThis research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr
... Show More