Preferred Language
Articles
/
PxZpW4cBVTCNdQwCfUen
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calibrated model were very close tothe actual concentrations measured in field at different sampling points for different sampling days.Keywords: Chlorine decay, Water quality, Water distribution network, EPANET softwar (PDF) Simulation of Chlorine Decay in Al-Gukook Water Distribution Networks Using EPANET. Available from: https://www.researchgate.net/publication/328201790_Simulation_of_Chlorine_Decay_in_Al-Gukook_Water_Distribution_Networks_Using_EPANET [accessed Apr 07 2023].

Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Thermal Simulation for Unconditioned Single Zone with Modified Roof
...Show More Authors

Roof in the Iraqi houses normally flattening by a concrete panel. This concrete panel has poor thermal properties. The usage of materials with low thermal conductivity and high specific heat gives a good improvements to the thermal properties of the concrete panel, thus, the indoor room temperature improves. A Mathcad program based on a mathematical model employing complex Fourier series built for a single room building. The model input data are the ambient temperature, solar radiation, and sol-air temperature, which have been treated as a periodic function of time. While, the room construction is constant due to their materials made of it, except the roof properties are taken as a variable generated practically from the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
...Show More Authors

Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Hybrid compensation of polarization-multiplexed QPSK optical format for high bit rate networks
...Show More Authors

<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computer Modeling In Engineering &amp; Sciences
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Opinions of Abu Bakr Muhammad bin Al-Fadl Al-Bukhari Al-Hanafi (d. 381 AH): In acts of worship: the books of fasting and Hajj
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

Scholars, past and present, have paid attention to the books of Fasting and Hajj, and they have compiled literature on that, and they have written treatises and researches. The best days, and as for the pilgrimage, it is one of the great pillars of Islam, which God Almighty has distinguished by making its rituals in the best of places, which is the Sacred House of God.

View Publication Preview PDF
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Microstructural Characterization and Mechanical Properties of Similar and Dissimilar Al Alloys Joined using Friction Stir Welding
...Show More Authors

The influence of pre- shot peening and welding parameters on mechanical and metallurgical properties of dissimilar and similar aluminum alloys AA2024-T3 and AA6061-T6 joints using friction stir welding have been studied. In this work, numbers of plates were equipped from sheet alloys in dimensions (150*50*6) mm then some of them were exposed to shot peening process before friction stir welding using steel ball having diameter 1.25 mm for period of 15 minutes. FSW joints were manufactured from plates at three welding speeds (28, 40, 56 mm/min) and welding speed 40mm/min was chosen at a rotating speed of 1400 rpm for welding the dissimilar pre- shot plates. Tow joints were made at rotational speed of 1000 rpm and welding speed of 40m/min f

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Determination of Some Volatile Organic Compounds in the water produced at Al-Ahdab oilfield in the Governorate of Wasit, Iraq using Headspace SPE-GC-FID
...Show More Authors

The study was conducted over the period of Oct 2018 to Apr 2019 and is aimed for the detection and estimation of four hazardous Volatile Organic Compounds VOC (benzene, toluene, ethylbenzene, and xylene) so-called (BTEX) in samples collected from the produced water in the Al-Ahdab oil field in Iraq also to track their availability in the important natural water sources around the field. These compounds pose a risk to human health as well as environment. To avoid the laborious and tiresome conventional extraction methods, water samples were collected and concentrated using solid-phase extraction technique (SPE) which is a robust and cost-effective method of sample extraction with minimal exposure and handling of solvents and then to be analy

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref