Preferred Language
Articles
/
ijcpe-67
Study the Effect of Using Microwave Radiation and H-Donors on Improving Heavy Oil
...Show More Authors

The present research has investigated the effect of microwave energy on improving the flow properties of heavy crude oil. The fragmentation of crude oil molecules was carried out with and without using 1 and 10 wt. % concentration of various types of H-donors like tetralin, cyclohexane, and naphtha.  Microwave power of 320, 385, and 540 W and radiation time 1-9 min, and temperature were studied. The kinematic viscosity and asphaltene content were measured for evaluation the improving of heavy crude oil.

   Results show that viscosity of crude oil decreased with increase H-donor concentration, a maximum percentage of viscosity reduction was10.63 % for tetralin at 6 min radiation time, while 8.67%, and 7.34% for cyclohexane and naphtha at 4 min respectively. The high H-donor polarity is the high viscosity reduction.

   The asphaltenes content of crude oil was decreased during microwave treatment process, a maximum percentage of reduction was 39.73% for tetralin at 6 min radiation time, while 34.40% and 46.29 % for cyclohexane and naphtha at 4 min respectively. The viscosity of crude oil was decreased with asphaltenes content decrease.

   The temperature of a crude oil was varied during the microwave treatment and it was depended on radiation time and radiation power and H-donor type.

   The best reduction of crude oil viscosity and asphaltenes content was achieved at a moderate radiation power385 W.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Estimating the impact of tax exemptions on achieving economic development in Iraq for the period (2015-2021): An Applied research in the General Authority for Taxes
...Show More Authors

Abstract

          The research aims to identify tax exemptions, their objectives and types, as well as to shed light on the concept of sustainable development, its objectives, dimensions and indicators (economic, social and environmental), as well as to analyze the relationship between tax exemptions and economic development, in addition to measuring and analyzing the impact of tax exemptions on economic development in Iraq for the period ( 2015 - 2021) using the NARDL model. The research problem centers on the fact that failure to employ financial policy tools correctly led to a weakness in achieving economic justice, which leads to a failure to improve social welfar

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Considerable use of computers and the Internet in managing public relations activities The Ministries of Justice and the Interior are examples
...Show More Authors

She noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The impact of the use of pulverized black bean and fat in homemade bread mix in the quality and attributes Alkhoznip
...Show More Authors

Factory is trotting home favorite of of Aeidid of Iraqi families since he Amta imparted to the taste of the housewife on the method of processing and preparation and the possibility of using some of the ingredients to raise the nutritional value of meat, sesame and other, but how keep Bz'zajh this product Atne storage

View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Mustansiriyah Journal Of Arts
The Significance of Utilizing the Social Networking Site (LinkedIn) Among Researchers and Specialists in the Field of Information and Knowledge Technologies
...Show More Authors

This study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Structuralism and the Problem of Text
...Show More Authors

All modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, r

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 28 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Trends Technological And Science ,engineering
Automated Sorting for Tomatoes using Artificial Neural Network
...Show More Authors

A .technology analysis image using crops agricultural of grading and sorting the test to conducted was experiment The device coupling the of sensor a with camera a and 75 * 75 * 50 dimensions with shape cube studio made-factory locally the study to studio the in taken were photos and ,)blue-green - red (lighting triple with equipped was studio The .used were neural artificial and technology processing image using maturity and quality ,damage of fruits the of characteristics external value the quality 0.92062, of was value regression the damage predict to used was network neural artificial The .network the using scheme regression a of means by 0.98654 of was regression the of maturity and 0.97981 of was regression the of .algorithm Marr

... Show More
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Hexapod Robot Static Stability Enhancement using Genetic Algorithm
...Show More Authors

Abstract

Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each

... Show More
View Publication Preview PDF