In this study, the effects of blending the un-branched acrylate polymer known as Poly (n-decyl acrylate), and the branched acrylate polymer known as Poly (iso-octyl acrylate), on the viscosity index (VI), and the pour point of the Iraqi base stocks 40, and 60 respectively, were investigated. Toluene was used as a carrier solvent for both polymer types. The improvement level of oils (VI, & pour point) gained by blending the oil with the acrylate derived polymers was compared with the values of (VI, and pour point) gained by blending the oil with a commercial viscosity index, and pour point improver. The commercial lubricant additive was purchased and used by Al-Daura Refineries. It consisted of an un-known olefin copolymer dissolved in an un-known carrier solvent. All polyacrylate derivatives and the commercial lubricant additive named HITEC5748 were blended with each type of oil in weight percentage of (2, 4, 6, 8, & 10) wt. %. The result of the study was that the improvement in the viscosity index and the pour point of both base stock types was higher when using the polyacrylate derivatives than when using the commercial olefin copolymer additive.
Background: diagnostic radiology field workers are at elevated risk level for systemic and oral diseases like periodontal diseases. This study was aimed to estimate the periodontal condition and salivary flow rate among diagnostic radiology workers. Material and method: The sample for this study consisted of a study group radiographers (forty subjects) working for 5 years at least and control group consisted of nurses and laboratory workers away from radiation (forty subjects) in Baghdad hospitals. All the 80 subjects aged 30-40 year-old and looking healthy without systemic diseases. Plaque, gingival, periodontal pocket depth and clinical attachment loss indices were used for recording the periodontal conditions. Under standardized condi
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught
... Show More<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreBackground: Cerebral palsy is non-progressive disorder of posture or movement due to a lesion of the developing brain. It is the commonest physical disability in childhood. Objective: To study the clinical, neurological abnormalities, prevalence of convulsion (epilepsy) & to asses the value of CT scans of brain in patients with cerebral palsy.
Background: Toxoplasma gondiiis an obligate intracellular protozoan that may infect nearly all warm-blooded animals, including humans. T gondiiis thought to infect one-third of the human population.The symptoms depending on the adequacy of the immune antiparasitic response. In humans, the main source of infection is through contact with the feces of infected cats, the final host in which the T. gondii completes its life cycle. Other source of infection occurs when drinking raw milk, ingestion of contaminated meat. Aim: This descriptive study estimated the seroprevalence and risk variables for Toxoplasma gondii infection forundergraduate students of a college of Pharmacy who were studying at University of Baghdad. The frequency rate ofToxopl
... Show MoreBuzurgan oil Field which is located in south of Iraq has been producing oil for five decades that caused production to drop in many oil wells. This paper provides a technical and economical comparison between the ESP and gas lift in one oil well (Bu-16) to help enhancing production and maximize revenue. Prosper software was used to build, match and design the artificial lift method for the selected well, also to predict the well behavior at different water cut values and its effect on artificial lift method efficiency. The validity of software model was confirmed by matching, where the error difference value between actual and calculated data was (-1.77%).
The ESP results showed the durability of ESP regarding th
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More