Preferred Language
Articles
/
alkej-756
Evaluation of the Main Causes of Diesel Engine Injector Failure using Fault Tree Analysis
...Show More Authors

The maintenance of the diesel engine parts in any electric power station contains many problems that lead to stopping. Several reasons lead to such problems; these reasons should be analyzed and evaluated in order to eliminate their effects. This paper is based on evaluation of the main causes that lead to diesel engine injector failure as a main part of electric power stations, using fault tree analysis (FTA). The FTA is the most broadly utilized strategies in the industrial area to perform reliability analysis of complex designing frameworks. A fault tree is a logical representation of the relationship of basic events that lead to a given unwanted event (i.e., top event).

Starting with introducing the FTA and how it could be utilized in analyzing the reasons of main issues that lead to that the injector stops working, in which the probability of occurrence of each issue is calculated. The application of the root cause analysis principle of diesel engine injector failure in diesels Haditha station is chosen as a case under study. According to the probabilities’ evaluation by using the FTA based on of the causes under the top event its value was (0.80). It is concluded from the analysis that the three largest values of the occurrence of a problem with the diesel engine injector are 0.50 for fuel problems, 0.20 for overloads, and 0.18 for nozzle head corrosion. Plant management can define a specific plan with taking into consideration the calculated value of each cause in order to reduce their impacts and to avoid long downtime hours compared to operating hours. Finally, recommandations are suggested to overcome these causes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluation Properties and PNA Analysis for Different Types of Lubricants Oils
...Show More Authors

A study of characteristics of the lubricant oils and the physical properties is essential to know the quality of lubricant oils. The parameters that lead to classify oils have been studied in this research. Three types of multi-grades lubricant oils were applied under changing temperatures from 25 oC to 78oC to estimate the physical properties and mixture compositions. Kinematic viscosity, viscosity gravity constant and paraffin (P), naphthenes (N) and aromatics (A) (PNA) analysis are used to predict the composition of lubricants oil. Kinematic viscosity gives good behaviors and the oxidation stability for each lubricant oils. PNA analysis predicted fractions of paraffin (XP), naphthenes (XN),

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Borrowing in a diwan Moon Tree for Nazik Angels
...Show More Authors

The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Morphological study of bronchial tree and lung in Iraqi weasel (Herpestes javanicus)
...Show More Authors
Abstract<p>The current study aimed to identify the morphological description and branches of the bronchial tree and lung for the weasel <italic>Herpestes javanicus</italic> as one of the Iraqi mammals inhabiting the Iraqi environment. In the current study, 10 samples with an mean weight of 288-564 g were used, trachea and lung were removed from the samples and confirmed using proven solutions and laboratory tests were conducted on 5 samples of the study to identify the branches of the bronchial tree using the technique of casting resin and then exposing the samples to erosion. Weasel has a pair of bright pink sponge lungs that occupy most of the thoracic cavity. The lungs look similar </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Studying and Modeling the Effect of Graphite Powder Mixing Electrical Discharge Machining on the Main Process Characteristics
...Show More Authors

Abstract

This paper concerned with study the effect of a graphite micro powder mixed in the kerosene dielectric fluid during powder mixing electric discharge machining (PMEDM) of high carbon high chromium AISI D2 steel. The type of electrode (copper and graphite), the pulse current and the pulse-on time and mixing powder in kerosene dielectric fluid are taken as the process main input parameters. The material removal rate MRR, the tool wear ratio TWR and the work piece surface roughness (SR) are taken as output parameters to measure the process performance. The experiments are planned using response surface methodology (RSM) design procedure. Empirical models are developed for MRR, TWR and SR, using the analysis

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
The Synoptic Characteristics, Causes, and Mechanisms of Kahlaa Tornado in Iraq on 14th April 2016
...Show More Authors

In this study, an analysis of the synoptic characteristics, causes and mechanisms of Kahlaa tornado event was carried out. This tornado occurred on 10:30 UTC (1:30 pm Iraq Local Time) on 14 April 2016 to the north of Kahlaa town in Maysan governorate. We analyzed surface and upper charts, weather conditions, the damage indices, the dynamical features and the instability of the tornado. The analysis showed that there was a low pressure system which was an extension of the Monsoon low in addition to a supercell thunderstorm and a jet stream aloft. The cold trough and high relative vorticity at 500 hPa level, the humid warm wind blowing from the south and the dry cold wind from the north contributed to the initiation of the tornado. Accordi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 20 1930
Journal Name
College Of Islamic Sciences
The causes of defeat and weakness and humiliation as described by Al - Imran: Objective study
...Show More Authors

Praise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
 Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
 And news.
The Great Quran Study

Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 22 2006
Journal Name
Journal Of Physical Education
The Percentage Of Success And Failure Of Some Compound Offense Skills In Basketball For Joiners
...Show More Authors

The aim of the research is to identify the percentage of success and failure of some compound offensive skills in joiner basketball. It was evident that development only occurred though the mastery of the basic single offence skills as well as the ability to perform compound skills accurately and consistently. Not paying enough attention to compound skills leads evidentially to weakness in the athlete's level that in turn leads to mistakes in performance. Six joiner games of the best four teams in Baghdad were filmed and analyzed. The results of analyzing the compound offence skills were as follows:  There was some weakness in the athletes' ability in using compound offence skills specially receiving, dribbling and following through that

... Show More
Preview PDF