The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreGeneral Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k
... Show MoreBased on a finite element analysis using Matlab coding, eigenvalue problem has been formulated and solved for the buckling analysis of non-prismatic columns. Different numbers of elements per column length have been used to assess the rate of convergence for the model. Then the proposed model has been used to determine the critical buckling load factor () for the idealized supported columns based on the comparison of their buckling loads with the corresponding hinge supported columns . Finally in this study the critical buckling factor () under end force (P) increases by about 3.71% with the tapered ratio increment of 10% for different end supported columns and the relationship between normalized critical load and slenderness ratio was g
... Show MoreThe present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreStudy of Direct Marketing techniques and determining the scope of the suitability of each of them in the application in the Iraqi market - An analytical and explorative study for sample of views for wholesaler in Baghdad. The essential idea of the research is to go into the most important concepts which have been mentioned in the direct marketing and determining its current and most important techniques and knowing the scope of applying these techniques in Baghdad main markets (Karrada, Jamilah, shorja, Baya area, zeyouna and new Baghdad) and which of those techniques most applicable in these markets. The research took a sample of (100) wholesalers who practice the activities of selling nutritional items, auto and outs spare part
... Show MoreMS Elias, RGM AL-helfy, Plant Archives, 2019