Image Fusion Using A Convolutional Neural Network
In the present work, a closed loop circulation system consist of three testing sections was designed and constructed. The testing sections made from (3m) of commercial carbon steel pipe of diameters(5.08, 2.54 and 1.91 cm) . Anionic surfactant (SDBS )with concentrations of (50, 100, 150, 200 and 250 ppm) was tested as a drag reducing agent. The additive(SDBS)studied using crude oil from south of Iraq. The flow rates of crude oil were used in 5.08 and 2.54 cm I.D. pipes are (1 - 12) m3/hr while (1-6) m3/hr were used in 1.91 cm J .D. pipe . Percentage drag reduction (%Dr) was found to increase by increasing solution velocity, pipe diameter and additives concentration (i.e. increasi
... Show MoreThe public budget is on the same time an art and a science .As an accountable science it seeks balance between public income and public expenditure for an accountable year. And as an accountable art it seeks to achieve economic balance by distributing equitable income in order to reach sustainable development .This is the optimal use of all natural and human resources to address scarcity of natural resources facing the increase need of human resources by spending on education, health, environment, housing, agriculture and industry to achieve social justice for the current generation and future generations. Since the first budget in Iraq on 1921 an accounting budget, is balancing the sections and items has been adopted and since the publi
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreProduction logging is used to diagnose well production problems by evaluating the flow profile, entries of unwanted fluids and downhole flow regimes. Evaluating wells production performance can be easily induce from production logs through interpretation of production log data to provide velocity profile and contribution of each zone on total production. Production logging results supply information for reservoir modeling, provide data to optimize the productivity of existing wells and plan drilling and completion strategies for future wells. Production logging was carried out in a production oil well from Mishrif formation of West Qurna field, with the objective to determine the flow profile and fluid contributions from the perforations af
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square
... Show More