This work studied the facilitation of the transportation of Sharqi Baghdad heavy crude oil characterized with high viscosity 51.6 cSt at 40 °C, low API 18.8, and high asphaltenes content 7.1 wt.%, by reducing its viscosity from break down asphaltene agglomerates using different types of hydrocarbon and oxygenated polar solvents such as toluene, methanol, mix xylenes, and reformate. The best results are obtained by using methanol because it owns a high efficiency to reduce viscosity of crude oil to 21.1 cSt at 40 °C. Toluene, xylenes and reformate decreased viscosity to 25.3, 27.5 and 28,4 cSt at 40 °C, respectively. Asphaltenes content decreased to 4.2 wt. % by using toluene at 110 °C. And best improvement in API of the heavy crude oil is 26.1 at 40 °C by using xylenes.
It is important that real time stability in smart grids is ensured as the integration of renewables and the complexity of the systems grows. In this paper, we provide a solid architecture, which combines a Residual CNNLSTM deep neural network predictor, FPGA-accelerated Model Predictive Control (MPC), and SHAP-based explainability. The proposed method predicted with 99.8% accuracy using the Electrical grid Stability Simulated Dataset (UCI) and minimized the instability rates surpassing 85 percent in all operating conditions. Meeting real-time operating needs, FPGA deployment on a Xilinx Zynq UltraScale+ provided 3.1 ms latency and 5 times reduced energy consumption against CPU processing. By emphasizing bus voltage and frequency as major in
... Show MoreHeuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreThe High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic al
... Show MoreThe simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn this study, simple, low cost, precise and speed spectrophotometric methods development for evaluation of sulfacetamide sodium are described. The primary approach contains conversion of sulfacetamide sodium to diazonium salt followed by a reaction with p-cresol as a reagent in the alkaline media. The colored product has an orange colour with absorbance at λmax 450 nm. At the concentration range of (5.0-100 µg.mL-1), the Beer̆ s Low is obeyed with correlation coefficient (R2= 0.9996), limit of detection as 0.2142 µg.mL-1, limit of quantification as 0.707 µg.mL-1 and molar absorptivity as 1488.249 L.mol-1.cm-1. The other approach, cloud point extraction w
... Show MoreThe temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated
... Show MoreFor this research, the utilisation of electrocoagulation (EC) toremove theciprofloxacin (CIP) and levofloxacin (LVX) from aqueous solutions was examined. The effective removal efficiencies are 93.47% for CIP and 88.00% for LVX, under optimum conditions. The adsorption isotherm models with suitable mechanisms were applied to determine the elimination of CIP and LVX utilizingtheEC method. Thefindingsshowed the adsorption of CIP and LVX on iron hydroxide flocs followed the Sips isotherm, with correlation coefficient values (R2) of 0.939 and 0.937. Threekinetic models were reviewed to determine the accurate CIP and LVX elimination methods using the EC method. The results showed that itfittedfor the second-order model, which indicated that the c
... Show MoreIn this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.