Preferred Language
Articles
/
joe-405
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks
...Show More Authors

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Interactive versatile computer programs are developed to provide the necessary system parameters data including the anode requirements, composition, rating, configuration, etc. Microsoft-Excel datasheet and Visual Basic.Net developed software were used throughout the study in the design of both cathodic protection systems.

The case study considered in this work is the eleven aboveground storage tanks farm situated in al-Shauiba refinery in southern IRAQ. The designed cathodic protection systems are to be installed and monitored realistically in the near future. Both systems were designed for a life span of (15-30) years, and all their parameters were within the internationally accepted standards.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Ecological Engineering
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 06 2024
Journal Name
Journal Of Ecological Engineering
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying

... Show More
Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Some Storage Conditions upon the Survival of Some Fungal Spores
...Show More Authors

Folic acid and multivitamin tablets containing Aspergillus flavus Penicillia spp. and Cladosporia spores were prepared at a compression pressure of 148 MN/m2 and stored at 35°C under different relative  humidifies (75,85, and 95)% within air tight containers, to study the effect of storage condition on them, as well as ,the estimation of the microbial level of the raw materials intended to be used in the two kinds of tablets . Result showed that some raw materials derived from natural origin were heavily contaminated with microorganism compared to that of synthetic origin ,the results also indicated the effect of relative humidity , types of fungal spore , and the hygroscopic nature of exicpient upon survival. Multivit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 03 2021
Journal Name
International Journal Of Energy Research
Simulation and experimentation study on the performance of metal hydride storage vessels
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Nov 03 2021
Journal Name
International Journal Of Energy Research
Simulation and experimentation study on the performance of metal hydride storage vessels
...Show More Authors

This paper details the process of designing, analysing, manufacturing, and testing an integrated solid-state hydrogen storage system. Analysis is performed to optimise flow distribution and pressure drop through the channels, and experimental investigations compare the effects of profile shape on the overall power output from the fuel cell. The storing of hydrogen is given much attention in the selection of a storage medium, and the effect of a cooling system to reduce the recharging time of the hydrogen storage vessel. The PTFE seal performed excellently, holding pressure over 60 bar, despite requiring changing each time the cell is opened. The assembly of the vessel was simple and straightforward, and there was no indication of pressure

... Show More
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and its role in the protection of widows (Problems and advancement options) A field study in the Social Welfare Department for Women
...Show More Authors

Current search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 10 2014
Journal Name
Desalination And Water Treatment
Groundwater protection from lead contamination using granular dead anaerobic sludge biosorbent as permeable reactive barrier
...Show More Authors

Scopus (26)
Crossref (23)
Scopus Clarivate Crossref