Preferred Language
Articles
/
alkej-13
Design of a Programmable System for Failure Modes and Effect Analysis of Steam-Power Plant Based on the Fault Tree Analysis
...Show More Authors

In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.

   The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is depending on the logical relationships of the fault tree analysis for the systems that contained in the power station.

   The designing of such system could be used as an assistance tool for the specialist user (the power engineer) in identifying of all reasons and effects for any type of failures. So this is help to fastening the repairing operation of the identified failure mode to improve the efficiency of operating system as represented by the maintainability, which is a function of system reliability.

   The selection of the steam type of power generation systems for the application of this study, because this type is the most common type of Iraqi power plants. While such the designed system could be programmed to be use in another types of industrial systems.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 21 2023
Journal Name
International Journal Of Professional Business Review
Analysis of the Impact of Six Sigma and Risk Management on Iraq's Energy Sector Metrology
...Show More Authors

Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance.   Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis.   Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and t

... Show More
View Publication
Crossref
Publication Date
Tue Mar 21 2023
Journal Name
International Journal Of Professional Business Review
Analysis of the Impact of Six Sigma and Risk Management on Iraq's Energy Sector Metrology
...Show More Authors

Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance.   Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis.   Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and t

... Show More
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
The use of physical exercises specialized for with aids of developing explosive power for arms and legs and their effect on free throw and jump shooting skills for advanced basketball players
...Show More Authors

The research aims to develop physical exercises with auxiliary training tools that work to develop the explosive power of the arms and legs, and then find out their effect on the accuracy of shooting from free throw and correction from jumping of advanced basketball players, as the researchers found a problem that these players have weakness in the skill of throwing Free throwing and shooting by jumping calculated with two points as a result of adopting unhealthy physical and technical positions, which led to a lack of focus and accuracy, and thus negatively affected the performance technique of free throw and jump shot, as most teams use traditional exercises without the use of auxiliary training tools, and this topic gave researchers the

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Iraqi Geological Journal
EXPERIMENTAL STUDY OF MICRO SILICA BEHAVIOR AND ITS EFFECT ON IRAQI CEMENT PERFORMANCE BY USING X-RAY FLUORESCENCE ANALYSIS
...Show More Authors

The cement slurry is a mixture of cement, water and additives which is established at the surface for injecting inside hole. The compressive strength is considered the most important properties of slurry for testing the slurry reliability and is the ability of slurry to resist deformation and formation fluids. Compressive strength is governed by the sort of raw materials that include additives, cement structure, and exposure circumstances. In this work, we use micro silica like pozzolanic materials. Silica fume is very fine noncrystalline substantial. Silica fume can be utilized like material for supplemental cementations for increasing the compressive strength and durability of cement. Silica fume has very fine particles size less

... Show More
View Publication
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Reliability Analysis of Multibit Error Correcting Coding and Comparison to Hamming Product Code for On-Chip Interconnect
...Show More Authors

Error control schemes became a necessity in network-on-chip (NoC) to improve reliability as the on-chip interconnect errors increase with the continuous shrinking of geometry. Accordingly, many researchers are trying to present multi-bit error correction coding schemes that perform a high error correction capability with the simplest design possible to minimize area and power consumption. A recent work, Multi-bit Error Correcting Coding with Reduced Link Bandwidth (MECCRLB), showed a huge reduction in area and power consumption compared to a well-known scheme, namely, Hamming product code (HPC) with Type-II HARQ. Moreover, the authors showed that the proposed scheme can correct 11 random errors which is considered a high

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Essential Oils from Citrus By-Products Using Microwave Steam Distillation
...Show More Authors

The main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).

   Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extracti

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus