Preferred Language
Articles
/
ijcpe-290
New Viscosity Correlation for Different Iraqi Oil Fields
...Show More Authors

 

Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, saturated or under saturated reservoir. Validity and accuracy of the new correlation was confirmed by comparing the obtained results of this correlation and other ones, with experimental data for Iraqi oil samples. It was observed that the new correlation gave the most accurate agreement with the experimental data.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Elementary Education Online
Persuasive methods in advertising posters for the Corona pandemic
...Show More Authors

Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Forecasting Crop Coefficient Values for Cucumber Plant (Cucumis sativus)
...Show More Authors

In this study predication of crop coefficient (Kc) values through growing season for cucumber plant was conducted. A field experiment was carried out at AL Yusufiyah Township, in the Governorate of Baghdad, (latitude: 33°09' N, longitude: 44°24' E, and altitude: 34 m) in medium loam soil. The plant was cultivated inside the greenhouse under subsurface trickle irrigation system with soil water retention technology (SWRT) during the growing season 2017. Crop coefficient values were guessed from the direct method of measurements of daily crop evapotranspiration, while reference evapotranspiration was obtained from Agricultural Meteorology Project - Station of Baghdad - Abu-Ghraib.  The obtained results were showed that crop coeffici

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 16 2019
Journal Name
Journal Of Legal Sciences
Compensation Arising from Civil Liability for Media-Related Damages
...Show More Authors

Freedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.

View Publication
Publication Date
Thu Sep 20 2018
Journal Name
Www.intechopen.com
Internet of Things (IoT) for Automated and Smart Applications
...Show More Authors

Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u

... Show More
View Publication
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering And Applied Sciences
Design and Implementation of Electronic Infrastructure for Academic Establishment
...Show More Authors

View Publication
Crossref
Publication Date
Sun Aug 15 2021
Journal Name
Al-qadisiyah Journal Of Pure Science Vol.(26) Issue (special Issue Num.4) (2021) Pp. 27–30
Cyclic partition for the groups of (2,41) and (2,43)
...Show More Authors

Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
The Operational Matrices Methods for Solving Falkner-Skan Equations
...Show More Authors

     The method of operational matrices is based on the Bernoulli and Shifted Legendre polynomials which is used to solve the Falkner-Skan equation. The nonlinear differential equation converting to a system of nonlinear equations is solved using Mathematica®12, and the approximate solutions are obtained. The efficiency of these methods was studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as  increases. Moreover, the obtained approximate solutions are compared with the numerical solution obtained by the fourth-order Runge-Kutta method (RK4), which gives  a good agreement.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref