Preferred Language
Articles
/
cRdjCpEBVTCNdQwCHZKJ
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for two types of controls tested at low soil moisture (48%) and high soil moisture (80 %) to study the value of current, anode voltage, pipe to soil potential (PSP) and consumed power. The results show an decrease of 59.1% in consumed power when the moisture changes from the low to high level. It was reached that the closed loop controller PID is the best solution in terms of efficiency, reliability, fast response and power consumption.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 17 2021
Journal Name
Academic Journal Of Interdisciplinary Studies
Employees Retention Strategy and its Impact on Organizational Memory: An Exploratory Research for the opinion of Faculty Members at Private Colleges on Baghdad
...Show More Authors

The research aims to determine the impact of employees’ retention strategy on organizational memory. This research is historical, descriptive, and analytical. The sample consists of 158 faculty members in five private colleges in Baghdad. The technique used to analyze the data is SEM (Structural Equation Modeling), and SPSS (Statistical Package for the Social Sciences). The research concludes that the employees retaining strategy plays a vital role in retaining employees and hence maintains organizational memory. The findings and recommendations of this research assure the administrations of private colleges that employees retention strategy play a vital role in retaining its employee and hence maintains organizational memory. T

... Show More
View Publication
Scopus (3)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Ecology
Effectiveness of oxidation enzymes in the ratio of gluten to wheat bread via different treatments of weeds control
...Show More Authors

Scopus (12)
Scopus
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
The use of mathematical formulas to control river pollution Study area Diyala River within the city of Baquba
...Show More Authors

Pollution of the aquatic environment and the depletion of the natural resource cause imbalance in the natural balance of the river environment and contributes to the deterioration of life and the killing of living organisms. Most of the old and modern cities and urban centers were set up close to the rivers because water enters the main lifeblood and all its facilities. The proximity of cities to rivers caused environmental problems resulting from the dumping of residues of these cities to a large and continuous, these wastes include all uses of the city (industrial, agricultural, residential and commercial) and others. The accumulation of these wastes inside the rivers water kills life and makes them unsuitable for various uses to bury

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 14 2026
Journal Name
Journal Of Education For Pure Science
EFFECT OF PLANT GROWTH REGULATOR IN INCREASING THE EFFICACY OF HERBICIDES IN COMMON REED(Phragmites communis Trin.) CONTROL.
...Show More Authors

This study was carried out in epidemically field with common reed (Phragmites communis Trin.) plants in the Nassiriah cityThiQur governorate ,during 2009/2010 to investigate the influence of plant growth regulator gibberellin (GA3)and cytokinin (CK) in increasing the efficacy of glyphosate and Fluazifop-butyl in common reed control . Factorial experiment in RCBD was used with three replications in tow Factors . Glyphosate 3500mg .l־¹ gave the higher mean of injury score of common reed and lower mean of common reed shoots , shoots dry weight and rhizome dry weight(3.59,22.01 shoot /0.5m² ,0.57Kg / 0.5m² and 250.50gm /0,5m² ),respectively. All plant growth regulators gaves the higher means of common reed shoots and rhizome dry weight com

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Practices Toward Infection Control Standardized Precautions in Azady Teaching Hospital in the City of Kirkuk
...Show More Authors

Objective: The aim of the present study is to assess the practices of nurses towards standard precautions at Azady
Teaching Hospital in the City of Kirkuk.
Methodology: A descriptive study, which uses the assessment approach and it was conducted on nurses from January
18th, 2009 to September 30th, 2009, using non-probability sampling a purposive sample of (37) subject (male and
female nurses) who worked at surgical wards in Azady Teaching Hospital in Kirkuk city was selected. Two study
instruments were utilized for proper data collection [questionnaire and observational checklist]; a questionnaire was
developed for the purpose of the study. It was comprised of two parts which included the nurses' demographic
characte

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref