In this research paper, two techniques were used to treat the drill cuttings resulting from the oil-based drilling fluid. The drill cuttings were taken from the southern Rumaila fields which prepared for testing and fixed with 100 gm per sample and contaminated with two types of crude oil, one from Rumaila oilfields with Sp.gr of 0.882 and the other from the eastern Baghdad oilfield with Sp.gr of 0.924 besides contamination levels of 10% and 15% w/w in mass. Samples were treated first with microwave with a power applied of 540 & 180 watts as well as a time of 50 minutes. It was found that the results reached below 1% w/w in mass, except for two samples they reached below 1.5% w/w in mass. Then, the sample of 1.41% w/w in mass, which has the highest contamination level after microwave treatment, was treated on three groups of earthworms. After the appropriate conditions, samples were prepared for treating by earthworms and for an incubation period of 21 days, the results highlighted the effectiveness of the succession process by reaching concentrations below 0.92%, 0.65%, and 0.42% w/w in mass.
In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis study describes the determination of some phenols in four different zones of Tigris river in Iraq including, AL-Krieat, AL-Kadhimiya, AL-Jadiriyah, and AL-Adhamiyah. The phenolic compounds analyzed were (2,3-dimethylphenol, 4-chlorophenol, 3-nitrophenol and 2,4-dinitrophenol) using reverse phase high performance liquid chromatography (RPHPLC) with a UV detector on ODS-C18 column(150×4.6 mm I.D) and a mobile phase consisted of methanol-water(30:70)%(v/v) at pH 5.0, and a column temperature at 30C° with 20 µL injection. UV detection helps to identify different phenols at wave length at 280 nm with a flow rate at 0.5 ml/min. The separation time was (< 6) min.The results indicated that the AL-Adhami
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).