Iraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for the protection of underground pipelines.
Modeling enables the designer to build cathodic protection for buried structure and predicting the places of anodes sites and its operating voltages and currents under various operational conditions, and comparing it with those in practices. In this work we compared between the field and simulation results which include, anode numbers, rectifier voltage, rectifier current and anode resistance. The most economical design for the first pipeline was at station no. 2 which need 2.5 A for protection of the pipeline for that specific length and for second pipeline station no. 4 which need 12 A for protection of the pipeline for that specific length.
The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show MoreThe use of blended cement in concrete provides economic, energy savings, and ecological benefits, and also provides. Improvement in the properties of materials incorporating blended cements. The major aim of this investigation is to develop blended cement technology using grinded local rocks . The research includes information on constituent materials, manufacturing processes and performance characteristics of blended cements made with replacement (10 and 20) % of grinded local rocks (limestone, quartzite and porcelinite) from cement. The main conclusion of this study was that all types of manufactured blended cement conformed to the specification according to ASTM C595-12 (chemical and physical requirements). The percentage of the compress
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreStumpff functions are an infinite series that depends on the value of z. This value results from multiplying the reciprocal semi-major axis with a universal anomaly. The purpose from those functions is to calculate the variation of the universal parameter (variable) using Kepler's equation for different orbits. In this paper, each range for the reciprocal of the semi-major axis, universal anomaly, and z is calculated in order to study the behavior of Stumpff functions C(z) and S(z). The results showed that when z grew, Stumpff functions for hyperbola, parabola, and elliptical orbits were also growing. They intersected and had a tendency towards zero for both hyperbola and parabola orbits, but for elliptical orbits, Stumpff functions
... Show MoreThe present research has investigated the effect of microwave energy on improving the flow properties of heavy crude oil. The fragmentation of crude oil molecules was carried out with and without using 1 and 10 wt. % concentration of various types of H-donors like tetralin, cyclohexane, and naphtha. Microwave power of 320, 385, and 540 W and radiation time 1-9 min, and temperature were studied. The kinematic viscosity and asphaltene content were measured for evaluation the improving of heavy crude oil.
Results show that viscosity of crude oil decreased with increase H-donor concentration, a maximum percentage of viscosity reduction was10.63 % for tetralin at 6 min radiation time, while 8.67%, and 7.34% for cycl
... Show More