Crude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the same row and the corrosion rate was extracted for three furnaces, starting from the area of heat transfer by radiation to the heat transfer area of the convection in three different operating units. It was found that the highest percentage corrosion value between the standard tube thickness and the thickness of conduction position was 37% with the conduction zone, and 31% with radiation zone. There, the tubes specification was tested. Five percent Cr-0.5 Moly and the temperature of radiation zone was 578 °C to 613 °C and the stack temperature was 410 °C to 450 °C. So, the results show that the maximum erosion occur at the convection zone.
A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
Freshwater mussels are a guild of stationary, suspended-feeding species; they perform significant ecological functions like nitrogen cycling, bioturbation that gives oxygen and habitat that other creatures need to survive, and increasing water clearance by filtration. Knowledge of the freshwater mussel Unio tigridis Bourguignat, 1852, distribution, and molecular study in Iraq was inadequate. In the current study, this species of freshwater Mussels belonging to the family Unionidae was collected from different locations in the Greater Zab River, from April 2022 to November 2022. The average water temperature of the site was arranged between (17.8 to 36.1 C°). All previous studies in the Kurdistan Region and Iraq were based on morphologic
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show More
The luxury of the grace and the extension of the vioa of the subjects that attract two teams of opinion,
Addame
QF Faba believes that
Meet
.
And poverty is the best in human life, and others see it
And Joe titling
Grace, and not for man to suffer as long as stigmatized and
Try not to have money.
And in recent years
G
F
S
A lot of people bypassing
.
I see who says austerity in
Thou shalt not see grace
Color of and
Luxury has been promoted to the religious life of
M
A lounge
And others, and a team of worshipers to distance themselves from the mantle of turquoise,
Faleh me
I was looking at this part because I did not
.
See my opinion
The art of theater penetrated various scientific and human fields, as well as touching the facts and events surrounding it, and scientific innovations had a wide field, so it adopted feedback in interactive theater performances, especially the theater of the oppressed. Then came the indicators that resulted from the theoretical framework for the formation of the tool by which the research sample is analyzed, and then the chapter concluded with previous studies. As for the third chapter, it involved the research procedures, and through the research tool and the research method, and by selecting the intentional sample, the sample represented by a play (the story of Shahrour) was analyzed. As for the fourth chapter, it included the results
... Show MoreThe Role of Japan in the Reconstruction of Iraq
In present work examined the oxidation desulfurization in batch system for model fuels with 2250 ppm sulfur content using air as the oxidant and ZnO/AC composite prepared by thermal co-precipitation method. Different factors were studied such as composite loading 1, 1.5 and 2.5 g, temperature 25 oC, 30 oC and 40 oC and reaction time 30, 45 and 60 minutes. The optimum condition is obtained by using Tauguchi experiential design for oxidation desulfurization of model fuel. the highest percent sulfur removal is about 33 at optimum conditions. The kinetic and effect of internal mass transfer were studied for oxidation desulfurization of model fuel, also an empirical kinetic model was calculated for model fuels
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More