Preferred Language
Articles
/
ijcpe-304
Simulation of Cathodic Protection System Using Matlab
...Show More Authors

Iraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for the protection of underground pipelines.
Modeling enables the designer to build cathodic protection for buried structure and predicting the places of anodes sites and its operating voltages and currents under various operational conditions, and comparing it with those in practices. In this work we compared between the field and simulation results which include, anode numbers, rectifier voltage, rectifier current and anode resistance. The most economical design for the first pipeline was at station no. 2 which need 2.5 A for protection of the pipeline for that specific length and for second pipeline station no. 4 which need 12 A for protection of the pipeline for that specific length.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Heat Transfer-asian Research
Comparative study on heat transfer enhancement of nanofluids flow in ribs tube using CFD simulation
...Show More Authors

View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Numerical Simulation of Gas Lift Optimization Using Artificial Intelligence for a Middle Eastern Oil Field
...Show More Authors
Abstract<p>Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit</p> ... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Thu Nov 18 2021
Journal Name
Frontiers In Public Health
Dentists' Practices and Attitudes Toward Using Personal Protection Equipment and Associated Drawbacks and Cost Implications During the COVID-19 Pandemic
...Show More Authors

Objectives: During the COVID-19 pandemic, dentists have had to work under stressful conditions due to the nature of their work. Personal protection equipment (PPE) has become mandatory for work in the dentistry field. This study aimed to examine dentists' practices and attitudes regarding the use of PPE and the associated drawbacks and cost implications during the pandemic.

Methods: A questionnaire-based survey was used and was divided into five sections dedicated to collect demographic variables and to examine the dentists' practices, attitudes toward PPE, drawbacks, and cost of using PPE. Mann-Whitney U and Kruskal-Wallis tests were used to compare different sections of

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Secure Seaport Management System using Blockchain Technology
...Show More Authors

Worldwide, shipping documents are still primarily created and handled in the traditional paper manner. Processes taking place in shipping ports as a result are time-consuming and heavily dependent on paper. Shipping documents are particularly susceptible to paperwork fraud because they involve numerous parties with competing interests. With the aid of smart contracts, a distributed, shared, and append-only ledger provided by blockchain technology allows for the addition of new records. In order to increase maritime transport and port efficiency and promote economic development, this paper examines current maritime sector developments in Iraq and offers a paradigm to secure the management system based on a hyper-ledger fabric blockchain p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Partial Least Square Regression(PLSR) and Tree Regression by Using Simulation(RT).
...Show More Authors

This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square

... Show More
View Publication Preview PDF
Crossref