Modification of gas chromatographic technique for the separation and determination of methyl ethoy silane compounds which were synthesized by the addition of absolute ethanol to methyl chlorosilane compounds have been elaborated experimentally. The addition of absolute dry ethanol to methyl chlorosilane compounds in the presence of a dry stream of nitrogen gas led to sweep out the liberated HCl gas. This method was found to be the suitable method for the preparation of methyl ethoxy silane compounds. The optimum parameter selected after careful and precise studies was between 20 – 30 ml \ min to carrieir gas flow rate, while applied temperatures of detector and injection part were 250 °C and 225 °C respectively. The results showed that suitable chromatographic column for the separation of methyl chloro silane compounds is 50% [5% dioctyl phthalate ] + 50% [10% OV- 101 ] .While 10 % OV – 101 column was found to be the best for the separation of methyl ethoxysilane compounds . Accordingly , a linear relationship for the calibration curve between concentration and peak area is achieved for methyl chlorosilane and methyl ethoxysilane . Correlation coefficients here ranged between 1 – 0.9991. The results of percentage RSD alotarned for the methyl chlorosilane and methyl ethoxysilane were 0.512.08 and 0.053-1.37 respectively.
Terrorist operations disturbed societies and threatened their existence due to destructive ideas carried by those groups that believe in radical change and the use of multiple methods to implement their ideas, as well as taking methods of concealment among society, so it has become difficult to detect them. The study's purpose is to locate sleeper cells of terrorist operations in areas dense with various human activities using remote sensing techniques and geographic information systems programs. The programs were used to analyze the group of terrorist incidents data that occurred in Baghdad in 2011 and study how to limit the crimes spreading in Baghdad. The study included building a model in spatial information systems for site
... Show MoreIn recent decades, global obesity has increased significantly, causing a major health problem with associated complications and major socioeconomic issues. The central nervous system (CNS), particularly the hypothalamus, regulates food intake through sensing the metabolic signals of peripheral organs and modulating feeding behaviors. The hypothalamus interacts with other brain regions such as the brain stem to perform these vital functions. The gut plays a crucial role in controlling food consumption and energy homeostasis. The gut releases orexigenic and anorexigenic hormones that interact directly with the CNS or indirectly through vagal afferent neurons. Gastrointestinal peptides (GIP) including cholecystokinin, peptide YY, Nesf
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreChickenpox is a viral disease caused by a virus called varicella zoster (VZ). Chickenpox cases were counted in Al-Dora city (southern Baghdad). Data of disease was obtained from the records of Bilat Al-Shuhadaa health center at the period from January to July 2012. Diagnosis of cases was achieved by the physicians of the health center. Studied risk factors were including the gender, address, school and age. Total of cases recorded was 73cases (66.9 per 100,000) populations for seven months. Males reported cases were 48 (65.7%) while female’s cases were 25(34.3%). The highest reported cases were signed in Al-Mhdia-1 sector (24.6%).Also highest reported cases were signed in Al-Mhdia primary school (17.8%). Most VZ cases were reported in
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show More