Preferred Language
Articles
/
6IZsboYBIXToZYALmInN
Investigation into the Distribution of Erosion-Corrosion in the Furnace Tubes of Oil Refineries
...Show More Authors

Crude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the same row and the corrosion rate was extracted for three furnaces, starting from the area of ​​heat transfer by radiation to the heat transfer area of ​​the convection in three different operating units. It was found that the highest percentage corrosion value between the standard tube thickness and the thickness of conduction position was 37% with the conduction zone, and 31% with radiation zone. There, the tubes specification was tested. Five percent Cr-0.5 Moly and the temperature of radiation zone was 578 °C to 613 °C and the stack temperature was 410 °C to 450 °C. So, the results show that the maximum erosion occur at the convection zone.

Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Generation of True Random TTL Signals for Quantum Key-Distribution Systems Based on True Random Binary Sequences
...Show More Authors

A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems

View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DISTRIBUTION AND PHYLOGENETIC OF FRESHWATER MUSSEL UNIO TIGRIDIS BOURGUIGNAT, 1852 (BIVALVIA, UNIONIDAE) FROM GREATER ZAB RIVER, IRAQ
...Show More Authors

Freshwater mussels are a guild of stationary, suspended-feeding species; they perform significant ecological functions like nitrogen cycling, bioturbation that gives oxygen and habitat that other creatures need to survive, and increasing water clearance by filtration. Knowledge of the freshwater mussel Unio tigridis Bourguignat, 1852, distribution, and molecular study in Iraq was inadequate. In the current study, this species of freshwater Mussels belonging to the family Unionidae was collected from different locations in the Greater Zab River, from April 2022 to November 2022. The average water temperature of the site was arranged between (17.8 to 36.1 C°). All previous studies in the Kurdistan Region and Iraq were based on morphologic

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The provisions of luxury in the performance of worship
...Show More Authors

 

The luxury of the grace and the extension of the vioa of the subjects that attract two teams of opinion,
Addame
QF Faba believes that
Meet
.
And poverty is the best in human life, and others see it
And Joe titling
Grace, and not for man to suffer as long as stigmatized and

Try not to have money.
And in recent years
G
F
S

A lot of people bypassing
.
I see who says austerity in
Thou shalt not see grace
Color of and
Luxury has been promoted to the religious life of
M

A lounge
And others, and a team of worshipers to distance themselves from the mantle of turquoise,
Faleh me
I was looking at this part because I did not
.
See my opinion

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
Mechanism of feedback in the theater of the oppressed
...Show More Authors

The art of theater penetrated various scientific and human fields, as well as touching the facts and events surrounding it, and scientific innovations had a wide field, so it adopted feedback in interactive theater performances, especially the theater of the oppressed. Then came the indicators that resulted from the theoretical framework for the formation of the tool by which the research sample is analyzed, and then the chapter concluded with previous studies. As for the third chapter, it involved the research procedures, and through the research tool and the research method, and by selecting the intentional sample, the sample represented by a play (the story of Shahrour) was analyzed. As for the fourth chapter, it included the results

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Political Sciences Journal
The role of Japan in the reconstruction of Iraq
...Show More Authors

The Role of Japan in the Reconstruction of Iraq 

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Petroleum Science And Engineering
Factors affecting gel strength design for conformance control: An integrated investigation
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Investigation Desulfurization Method Using Air and Zinc Oxide/Activated Carbon Composite
...Show More Authors

In present work examined the oxidation desulfurization in batch system for model fuels with 2250 ppm sulfur content using air as the oxidant and ZnO/AC composite prepared by thermal co-precipitation method. Different factors were studied such as composite loading 1, 1.5 and 2.5 g, temperature 25 oC, 30 oC and 40 oC and reaction time 30, 45 and 60 minutes. The optimum condition is obtained by using Tauguchi experiential design for oxidation desulfurization of model fuel. the highest percent sulfur removal is about 33 at optimum conditions. The kinetic and effect of internal mass transfer were studied for oxidation desulfurization of model fuel, also an empirical kinetic model was calculated for model fuels

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Oct 28 2017
Journal Name
The Emirates Journal For Engineering Research (ejer), Issn: 1022-9892
The theory of sustainable integral design: Integration in the sustainability of the Marshes in southern Iraq
...Show More Authors