Preferred Language
Articles
/
2hZD2YkBVTCNdQwCFY0d
Pneumatic Control System of Automatic Production Line Using Two Method of SCADA/HMI Implement PLC
...Show More Authors

This study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting functions, is designed and simulated in FACTORY IO software and implemented. S7-1200 PLC employed to control the automatic production line using ladder logic diagram on TIA PORTAL V13 software. Two methods are adopted to create Human Machine Interface (HMI) for monitoring the status of the system (touch panel interface and LabVIEW interface). The communication between master program TIA PORTAL V15 software and slave program LABVIEW is through OLE Process Control (OPC) service. OPC offers greater flexibility and lower costs of development, integration, and assembly for controlling and monitoring the industrial process, as well as OPC involves a wide variety of data resource. As a result, the realized system enables two human interfaces for controlling and monitoring the physical values of the pneumatic system processes and parameters. In addition, it provides a way for different

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Bioethanol (Biofuel) Production from Low Grade Dates
...Show More Authors

Bioethanol production from sugar fermentation is one of the most sustainable alternatives to substitute fossil fuel. production of bioethanol from low grade dates which are rich of sugars. An available sugar from a second grade dates (reduction sugar) was 90g/l in this study. Sugar can be served as essential carbon sources for yeast growth in aerobic condition and can also be converted to bioethanol in anaerobic condition. The effect of various parameters on bioethanol production, fermentation time, pH-values, inoculum size and initial sugar concentration were varied in order to determine the optimal of bioethanol production. The highest bioethanol yield was 33g/l which was obtained with sugar concentration 90 g/l, inocu

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Diyala Journal For Pure Sciences
Multipole Mixing Ratios for Gamma transitions in 56Fe populated in Reaction by using least square fitting method .
...Show More Authors

The γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.

Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Using the Elzaki decomposition method to solve nonlinear fractional differential equations with the Caputo-Fabrizio fractional operator
...Show More Authors

The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The typical path of compliance control in the verification of tax revenues
...Show More Authors

The research aims to contribute to the consolidation of scientific knowledge of compliance control and its role in verifying the proper disposal of funds to manage the wheel of the economy towards achieving targeted development and preserving public money, as well as clarifying the role of tax revenues in strengthening the public treasury and achieving social justice. The analytical descriptive approach was adopted in the process of analyzing The quantitative data collected through personal interviews, and the research reached a set of conclusions, the most important of which is the contribution of compliance control according to its three principles. (Transparency, accountability, and inclusiveness) on the availability

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Calculation of Pressure Loss of Two Drilling Muds in Noor Oil Field
...Show More Authors

   

In this work, calculation of pressure losses in circulating system for two drilling muds is evaluated in Noor oil field. Two types of drilling muds that were used for drilling section 12 1/4" and 8 3/4" which are Salt saturated mud and Ferro Chrome Lignosulfonate-Chrome Lignite mud. These calculations are based on field data that were gathered from the drilling site of well Noor-15, which are included, rheological data, flow data and specification of drill string. Based on the obtained results, the best rheological model that fit their data is the Herschel-Bulkley model according to correlation coefficient value for their two drilling mud. Also, the difference between the calculated pressure lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Bioequivalence and Pharmacokinetics of Two Formulations of Amlodipine Tablets in Healthy Subjects
...Show More Authors

The bioequivalence of a single dose tablet containing 5 mg amlodipine as a test product in comparison to Norvasc® 5 mg tablet (Pfizer USA) as the reference product was studied. Both products were administered to twenty eight healthy male adult subjects applying  a fasting, single-dose, two-treatment, two-period, two-sequence, randomized crossover design with two weeks washout period between dosing. Twenty blood samples were withdrawn from each subject over 144 hours period. Amlodipine concentrations were determined in plasma by a validated HPLC-MS/MS method. From the plasma concentration-time data of each individual, the pharmacokinetic parameters; Cmax, Tmax, AUC0-t, AUC0-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Petroleum Research And Studies
Selection of an Optimum Drilling Fluid Model to Enhance Mud Hydraulic System Using Neural Networks in Iraqi Oil Field
...Show More Authors

In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss

... Show More
View Publication
Crossref (2)
Crossref