Liquefied petroleum gases (LPG) consist of hydrocarbons obtained by refining crude oil, either from propane or butane or a mixture of the two. There are often other components such as propylene, butylene or other hydrocarbons, but they are not the main component. The study aims to review previous studies dealing with designing an LPG system to deliver gas to residential campuses and buildings. LPG is extracted from natural gas NG by several processes, passing through fractionation towers and then pressuring into CNG storage tanks. Gas contains several problems, including gas leakage through the pipes and leads to fires or explosions in LPG storage and distribution tanks, so safety conditions were taken in the design and implementation. The major results are the gas leak detector showed that rapid response to gas leakage sense, so it is recommended to place the device at a distance of 0.6-2 meters from the gas source and at a distance of 0.2 to 1 meter above the ground, and the major conclusion is new techniques for using hardware and software components must be demonstrated again that can be applied to models to show fast and effective results.
ABSTRACT
Two compounds were isolated from the fruit part of Rhus coriaria that grow wildly or cultivated in the north of Iraq. The compounds were separated by preparative high-Performance Liquid Chromatography and their structures were established based on detailed spectroscopic techniques like FTIR and LC-MS/MS.
Keywords: Rhus coriaria, Preparative HPLC, LC-MSMS, FTIR
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreWellbore instability is a significant problem faced during drilling operations and causes loss of circulation, caving, stuck pipe, and well kick or blowout. These problems take extra time to treat and increase the Nonproductive Time (NPT). This paper aims to review the factors that influence the stability of wellbores and know the methods that have been reached to reduce them. Based on a current survey, the factors that affect the stability of the wellbore are far-field stress, rock mechanical properties, natural fractures, pore pressure, wellbore trajectory, drilling fluid chemicals, mobile formations, naturally over-pressured shale collapse, mud weight, temperature, and time. Also, the most suitable ways to reduce well
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers. In this research, we pr
... Show MoreIn this paper, experimental study has been done for temperature distribution in space conditioned with Ventilation Hollow Core Slab (TermoDeck) system. The experiments were carried out on a model room with dimensions of (1m 1.2m 1m) that was built according to a suitable scale factor of (1/4). The temperature distributions was measured by 59 thermocouples fixed in several locations in the test room. Two cases were considered in this work, the first one during unoccupied period at night time (without external load) and the other at day period with external load of 800W/m2 according to solar heat gain calculations during summer season in Iraq. All results confirm the use of TermoDeck system for ventilation and cooling/heat
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreLiquid-crystalline organic semiconductors exhibit unique properties that make them highly interesting for organic optoelectronic applications. Their optical and electrical anisotropies and the possibility to control the alignment of the liquid-crystalline semiconductor allow not only to optimize charge carrier transport, but to tune the optical property of organic thin-film devices as well. In this study, the molecular orientation in a liquid-crystalline semiconductor film is tuned by a novel blading process as well as by different annealing protocols. The altered alignment is verified by cross-polarized optical microscopy and spectroscopic ellipsometry. It is shown that a change in alignment of the