Fabrication of porous clay refractory insulating specimens from Iraqi kaolin with different percentage of Expanded Polystyrene (EPS) waste crumbs additions were investigated. After mixing and forming by hand molding, the specimens was dried and fired at 1300 oC. The structural, physical, mechanical and thermal properties of the refractory insulating products were measured. Maximum addition of EPS (1.25 wt%) lead to reduce the linear shrinkage to less than 1.7% and increased apparent porosity up to 50 %. As well as, the density, Modulus of rupture and thermal conductivity were reduced to 1.39 g/cm3, 4.1 MPa and 0.21 W/m.K, respectively. The final outcome, addition of EPS showed good results in the formation of pores without distorting the dimensions of specimens and without any cracks. In addition, it is possible to use these thermal insulators at temperatures up to 1300 oC.
Results showed that the optimum conditions for production of inulunase from isolate Kluyveromyces marxianus AY2 by submerged culture could be achieved by using inulin as carbon source at a concentration of 2% with mixture of yeast extract and ammonium sulphate in a ratio of 1:1 in a concentration of 1% at initial pH 5.5 after incubation for 42 hours at 30ºC.
Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThe current research focuses on a major problem: the weak role of disclosing corporate information in the application of laws, regulations and instructions related to the application of corporate governance principles weakens the ability to protect the rights of shareholders and investors in companies listed on the Iraqi Stock Exchange and the study aims to study and analyze the role of disclosure and transparency in achieving the necessary protection to ensure the rights of shareholders. The study was applied to a sample of (42) analysis samples representing (84%) of the total questionnaires distributed to investors and shareholders in all listed companies in the Iraqi Stock Exchange. The results confirm the shareholder's right to obtai
... Show MoreABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show MoreThe aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreAllah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within
The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.