Preferred Language
Articles
/
ijcpe-304
Simulation of Cathodic Protection System Using Matlab
...Show More Authors

Iraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for the protection of underground pipelines.
Modeling enables the designer to build cathodic protection for buried structure and predicting the places of anodes sites and its operating voltages and currents under various operational conditions, and comparing it with those in practices. In this work we compared between the field and simulation results which include, anode numbers, rectifier voltage, rectifier current and anode resistance. The most economical design for the first pipeline was at station no. 2 which need 2.5 A for protection of the pipeline for that specific length and for second pipeline station no. 4 which need 12 A for protection of the pipeline for that specific length.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
Nasal Prosthesis Fabrication using Rapid Prototyping and 3D Printing (A Case Study)
...Show More Authors

Abstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Iraqi Journal Of Physics
Enhancment of the corrosion resistance of copper metal by laser surface treatment
...Show More Authors

In this work, the copper metal was treated using Nd:YAG laser with energy 1Joul to enhance corrosion resistance and improve surface properties. The copper metal has many applications in industry as well as water, oil and gas pipes. The same conditions, (laser power density, scan speed, distance between paths, medium gas-air) were applied in the laser surface treatment, After laser treatment, the samples microstructures were investigated using optical microscope (OM) to examine micro structural changes due to laser irradiation. Specimen surfaces were investigated using atomic force microscopy (AFM), X-ray diffraction (XRD), macro hardness, and corrosion test before and after laser treatment to

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Using Bernoulli Equation to Solve Burger's Equation
...Show More Authors

In this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Modern Trends In Engineering And Research
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Tue Sep 01 2009
Journal Name
2009 5th International Conference On Wireless Communications, Networking And Mobile Computing
Cooperation Spectrum Sensing Using Optimal Joint Detecting
...Show More Authors

In cognitive radio networks, there are two important probabilities; the first probability is important to primary users called probability of detection as it indicates their protection level from secondary users, and the second probability is important to the secondary users called probability of false alarm which is used for determining their using of unoccupied channel. Cooperation sensing can improve the probabilities of detection and false alarm. A new approach of determine optimal value for these probabilities, is supposed and considered to face multi secondary users through discovering an optimal threshold value for each unique detection curve then jointly find the optimal thresholds. To get the aggregated throughput over transmission

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 14 2014
Journal Name
Desalination And Water Treatment
Copper biosorption using local Iraqi natural agents
...Show More Authors

Industrial effluents loaded with heavy metals are a cause of hazards to the humans and other forms of life. Conventional approaches, such as electroplating, ion exchange, and membrane processes, are used for removal of copper, cadmium, and lead and are often cost prohibitive with low efficiency at low metal ion concentration. Biosorption can be considered as an option which has been proven as more efficient and economical for removing the mentioned metal ions. Biosorbents used are fungi, yeasts, oil palm shells, coir pith carbon, peanut husks, and olive pulp. Recently, low cost and natural products have also been researched as biosorbent. This paper presents an attempt of the potential use of Iraqi date pits and Al-Khriet (i.e. substances l

... Show More
Crossref (6)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FILTRATION MODELING USING ARTIFICIAL NEURAL NETWORK (ANN)
...Show More Authors

In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Oct 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
AUTOMATIC ARABIC KEYWORD EXTRACTION USING LOGISTIC REGRESSION
...Show More Authors

View Publication
Crossref (1)
Crossref