Preferred Language
Articles
/
cRdjCpEBVTCNdQwCHZKJ
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for two types of controls tested at low soil moisture (48%) and high soil moisture (80 %) to study the value of current, anode voltage, pipe to soil potential (PSP) and consumed power. The results show an decrease of 59.1% in consumed power when the moisture changes from the low to high level. It was reached that the closed loop controller PID is the best solution in terms of efficiency, reliability, fast response and power consumption.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Indoor Positioning and Monitoring System Using Smartphone and WLAN (IPMS)
...Show More Authors

 

Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 15 2013
Journal Name
American Journal Of Health-system Pharmacy
Pharmacy in Iraq: History, current status, and future directions
...Show More Authors

View Publication
Scopus (39)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Influence of pressure and temperature on CO2-nanofluid interfacial tension: Implication for enhanced oil recovery and carbon geosequestration
...Show More Authors

Nanoparticles (NPs) based techniques have shown great promises in all fields of science and industry. Nanofluid-flooding, as a replacement for water-flooding, has been suggested as an applicable application for enhanced oil recovery (EOR). The subsequent presence of these NPs and its potential aggregations in the porous media; however, can dramatically intensify the complexity of subsequent CO2 storage projects in the depleted hydrocarbon reservoir. Typically, CO2 from major emitters is injected into the low-productivity oil reservoir for storage and incremental oil recovery, as the last EOR stage. In this work, An extensive serious of experiments have been conducted using a high-pressure temperature vessel to apply a wide range of CO2-pres

... Show More
Publication Date
Wed Mar 13 2024
Journal Name
Journal Of Robotics
Hierarchical Stabilization and Tracking Control of a Flexible-Joint Bipedal Robot Based on Anti-Windup and Adaptive Approximation Control
...Show More Authors

Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Single-Phase Grid-Tied Transformerless Inverter of Zero Leakage Current for PV System
...Show More Authors

View Publication
Scopus (58)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of governmental consumer spending on the development of the current account balance in Iraq for the period (1990-2014) using ARDL model
...Show More Authors

To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more  imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Self Protection and it's Relation with the social ignorance OF UNIVERSITY STUDENTS
...Show More Authors

The aim of this research is to find a relation between self-protection and the social - ignorance of the univresity students. In applying the aims of the reaearch, the ressearcher has constructed two scales to measure
self - protection and the social - ignorance. After finding their validity and stability and their discriminative power, the researcher has applied them on a sample of (200) male and female. University students, who were selected randomly. The results of the research has arrived at finding a positive relation between self-protection and social - ignorance.

The researcher has recommended a concentration on the role of parents in raising their childern depending on themselves and making f

... Show More
View Publication Preview PDF