The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show MoreBearing capacity of soil is an important factor in designing shallow foundations. It is directly related to foundation dimensions and consequently its performance. The calculations for obtaining the bearing capacity of a soil needs many varying parameters, for example soil type, depth of foundation, unit weight of soil, etc. which makes these calculation very variable–parameter dependent. This paper presents the results of comparison between the theoretical equation stated by Terzaghi and the Artificial Neural Networks (ANN) technique to estimate the ultimate bearing capacity of the strip shallow footing on sandy soils. The results show a very good agreement between the theoretical solution and the ANN technique. Results revealed that us
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreElectrochemical machining is one of the widely used non-conventional machining processes to machine complex and difficult shapes for electrically conducting materials, such as super alloys, Ti-alloys, alloy steel, tool steel and stainless steel. Use of optimal ECM process conditions can significantly reduce the ECM operating, tooling, and maintenance cost and can produce components with higher accuracy. This paper studies the effect of process parameters on surface roughness (Ra) and material removal rate (MRR), and the optimization of process conditions in ECM. Experiments were conducted based on Taguchi’s L9 orthogonal array (OA) with three process parameters viz. current, electrolyte concentration, and inter-electrode gap. Sig
... Show MoreThe present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w
... Show MoreAbstract:
This investigation was carried out to study the nutritional adequacy for
infant milk formula, which imported by Iraqi Ministry of Trade, and are
available in local markets .Most of these formulas contained nearly the same
composition of nutrients which are ,Matines ,Sunny Boy , Salsabeel AL- Badie
,Moroug, ,Charton ,Materna Lery Celia ,Lacstar Lailac,Nactalia. yet they are
unbalanced for providing the daily nutritional requirements for infants whom
depend on bottle feeding for six times daily in their first six month of age. As
there were an increase in daily intake for protein content and most vitamins
that included D, E, C, B1, B2, Niacin, B6, B12, and Biotin as well as most
minerals namely Calci