One of the most important environmental issues is the responsible effective and economic treatment of drilling waste especially oily waste.
In this research two fungal isolates named Pleurotus ostreatus and Trichoderma harzianum were chosen for the first time to treat biologically the oily drilled cuttings contaminated with diesel which resulted from drilling oil wells use oil based muds (OBMs).
The results showed that the fungi under study utilized the hydrocarbon of contaminated soil as a source of nutrient and growth and that both fungi can be considered hydrocarbon degrading microorganisms. The used biotreatment is cost effective process since most of the materials used in the cultivation and growth of the present fungi were available and cheap agricultural waste.
The best hydrocarbon degradation was observed in case of using both fungi together with 8 % by weight microorganisms concentration ratio and with the same ratio of nutrients components expressed as carbon/nitrogen/phosphorus equal to 100/60/10 with 10/1 carbon/potassium which gave average total petroleum hydrocarbon degradation of about 395 ppm per day. Good results were obtained using the new nutrients components ratio(C/N/P=100/60/10 with C/K=10) compared to other studies applied different nutrients ratios for the same type of diesel contamination.
Fiber‐reinforced elastic laminated composites are extensively used in several domains owing to their high specific stiffness and strength and low specific density. Several studies were performed to ascertain the factors that affect the composite plates’ dynamic properties. This study aims to derive a mathematical model for the dynamic response of the processed composite material in the form of an annular circular shape made of polyester/E‐glass composite. The mathematical model was developed based on modified classical annular circular plate theory under dynamic loading, and all its formulas were solved using MATLAB 2023. The mathematical model was also verified with real experimental work involving the vibration test of the f
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More