Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equilibrium data point with very good accuracy. The developments of this method are applied on 13 binary systems at different temperatures which gives very good accuracy.
The aim of this research does not deal with evaluation occurs at any points in the design of the plan alternatives themselves or formulation of goals and objectives. The aim of this research is that test and evaluate the fully alternatives. We can therefore state as the principle that evaluation of alternative plans must be based on attempts to show how far each plan satisfies all the objectives are expressed as specification of the performance of the urban and regional system. The planner can submit the result (as in the traditional way) for each alternative, with particular reference to the weighting of objectives. The summery result can be presented and the preferred plan indicated that with largest index of Goals-achievement.
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreMany waste materials can be repurposed effectively within asphalt concrete to enhance the performance and sustainability of pavement. One of these waste materials is sawdust ash (SDA). This study explores the beneficial use of SDA as a substitute for limestone dust (LD) mineral filler in asphalt concrete. The replacement rate was 0%, 15%, 30%, 45%, and 60% by weight of total mineral filler. Scanning electron microscopy (SEM) was employed to assess the surface morphology of Sawdust (SD), SDA, and LD. In addition, a series of tests, including Marshall stability and flow, indirect tensile strength,moisture susceptibility, and repeated uniaxial loading tests, were conducted to examine the performance characteristics of asphalt mixtures of diffe
... Show Moreفي هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR
... Show MoreA signature is a special identifier that confirms a person's identity and distinguishes him or her from others. The main goal of this paper is to present a deep study of the spatial density distribution method and the effect of a mass-based segmentation algorithm on its performance while it is being used to recognize handwritten signatures in an offline mode. The methodology of the algorithm is based on dividing the image of the signature into tiles that reflect the shape and geometry of the signature, and then extracting five spatial features from each of these tiles. Features include the mass of each tile, the relative mean, and the relative standard deviation for the vertical and horizontal projections of that tile. In the clas
... Show MoreVapor-liquid equilibrium data are presented for the binary systems n-hexane - 1-propanol, benzene - 1-propanol and n-hexane – benzene at 760 mm of mercury pressure. In addition ternary data are presented at selected compositions with respect to the 1-propanol in the 1-propanol, benzene, n-hexane system at 760 mmHg. The results indicate the relative volatility of n-hexane relative to benzene increases appreciably with addition of 1-propanol.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreNasiriyah oilfield is located in the southern part of Iraq. It represents one of the promising oilfields. Mishrif Formation is considered as the main oil-bearing carbonate reservoir in Nasiriyah oilfield, containing heavy oil (API 25o(. The study aimed to calculate and model the petrophysical properties and build a three dimensional geological model for Mishrif Formation, thus estimating the oil reserve accurately and detecting the optimum locations for hydrocarbon production.
Fourteen vertical oil wells were adopted for constructing the structural and petrophysical models. The available well logs data, including density, neutron, sonic, gamma ray, self-potential, caliper and resistivity logs were used to calculate the
... Show MoreThe current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter
... Show More