The present work is conducted on the Paleozoic (Ordovician) Khabour and the (Silurian) Akkas shales in the Akkas-1 well of western Iraq. The study is aiming to determine the implications of clay mineral transformation, organic mineral distribution and maturity of hydrocarbon generation, using X-ray diffraction (XRD), scanning electron microscopy (SEM) in addition to organic matter concentrations. In the shale of the Khabour Formation, amorphous organic matter is common and includes various Tasmanite-type organic matter, vitrinite, inertinite, and bituminite. The main clay minerals observed include illite, chlorite, kaolinite, in addition to mixed-layer illite-smectite and rare smectite. In Silurian shale, high content of organic matter i
... Show MoreThis study investigates the potential of biogas recovery from used engine oil (UEO) by co-digestion with animals’ manure, including cow dung (CD), poultry manure (PM), and cattle manure (CM). The experimental work was carried out in anaerobic biodigesters at mesophilic conditions (37°C). Two groups of biodigesters were prepared. Each group consisted of 4 digesters. UEO was the main component in the first group of biodigesters with and without inoculum, whereby a mix of UEO and petroleum refinery oily sludge (ROS) was the component in the second group of biodigesters. The results revealed that for UEO-based biodigesters, maximum biogas production was 0.98, 1.23, 1.93, and 0 ml/g VS from UEO±CD, UEO±CM, UEO±PM, and U
... Show MoreBacteriophage of E. Coli interspecies from sewage samples were isolated , the phage particles were isolated from two different sewage samples . The first sample was collected from sewage sample of Baghdad university and the second sample was isolated from domestic sewage sample , first sample showed phages specialized for three E. Coli interspecies bacteria (first plate ) and two E. Coli interspecies bacteria (second plate ) , meanwhile second sample showed phage specialized for two E. Coli. interspeciesThe study of appearance of E coli phages from first sample showed three types of E. coli phages with different size of inhibition zone ( 1 , 0.7,0.5 )Cm respectively ( first plate ) , meanwhile E. Coli interspecies bacteria showed phages
... Show MoreThere is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
ABSTRACT
The research focuses on the key issue concerning the use of the best ways to test the financial stability in the banking sector, considering that financial stability cannot be achieved unless the financial sector in general and the banking sector in particular are able to perform its key role in addressing the economic and social development requirements, under the laws and regulations that control banking sector , as the only way that increases its ability to deal with any risks or negative effects experienced by banks and other financial institutions. The research goal is to evaluate the stability of the banking system in Iraq, through the use of a set of econometrics an
... Show MoreThe issue of penalized regression model has received considerable critical attention to variable selection. It plays an essential role in dealing with high dimensional data. Arctangent denoted by the Atan penalty has been used in both estimation and variable selection as an efficient method recently. However, the Atan penalty is very sensitive to outliers in response to variables or heavy-tailed error distribution. While the least absolute deviation is a good method to get robustness in regression estimation. The specific objective of this research is to propose a robust Atan estimator from combining these two ideas at once. Simulation experiments and real data applications show that the proposed LAD-Atan estimator
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAn analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show More