Liquefied petroleum gases (LPG) consist of hydrocarbons obtained by refining crude oil, either from propane or butane or a mixture of the two. There are often other components such as propylene, butylene or other hydrocarbons, but they are not the main component. The study aims to review previous studies dealing with designing an LPG system to deliver gas to residential campuses and buildings. LPG is extracted from natural gas NG by several processes, passing through fractionation towers and then pressuring into CNG storage tanks. Gas contains several problems, including gas leakage through the pipes and leads to fires or explosions in LPG storage and distribution tanks, so safety conditions were taken in the design and implementation. The major results are the gas leak detector showed that rapid response to gas leakage sense, so it is recommended to place the device at a distance of 0.6-2 meters from the gas source and at a distance of 0.2 to 1 meter above the ground, and the major conclusion is new techniques for using hardware and software components must be demonstrated again that can be applied to models to show fast and effective results.
Abstract
The purpose of the present paper is to light on the relationship between jobs design, analysis and its reflections on reinforcing workers' vocational adjustment. The present paper aims to accomplish cognitive and applied goals, top of which, test of functional analysis ability to have effect upon workers' vocational adjustment via job design directly and indirectly owning to the virtual factor practiced by these practices on the sought organization. The problem of the present paper comes with many, the most important is the of how to bolster and back up worker's technical adjustment through good and accurate design for the job.
Based on this problem and goals as to expla
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreLiquid-liquid membrane extraction technique, pertraction, using three types of solvents (methyl isobutyl ketone, n-butyl acetate, and n-amyl acetate) was used for recovery of penicillin V from simulated fermentation broth under various operating conditions of pH value (4-6) for feed and (6-8) for receiver phase, time (0-40 min), and agitation speed (300-500 rpm) in a batch laboratory unit system. The optimum conditions for extraction were at pH of 4 for feed, and 8 for receiver phase, rotation speed of 500 rpm, time of 40 min, and solvent of MIBK as membrane, where more than 98% of penicillin was extracted.
Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreAbstract
This study aims at clarifying the current performance appraisal system in government units and the extent to which they contribute to the development of the performance of these units by evaluating and measuring the performance of these units on an ongoing basis to subject their services to an assessment and measurement process in order to improve the efficiency of these units to reach their objectives efficiently and effectively. (Iraqi hospitals) by trying to determine the possibility of the government accounting system in the process of evaluating performance, through the comparison of financial performance for successive years and different hospitals using the financial and non-financial model of the evaluati
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis study aims to highlight the role of financial control in the development of government performance through the use of "GFS" system and its application in the service of government units, which will help them in how to use financial resources efficiently through the quality of accounting information provided by this system in the financial statements that reflect the predictability in that fiscal policy of the state through government programs and activities fee as well as to identify weaknesses and address them quickly in order to avoid wastage and loss of public money, which leads to the possibility of utilization of available financial resources of the state to effectively and efficiently, has been reached that the failure of gove
... Show MoreThis article deals with the impact of including transverse ribs within the absorber tube of the concentrated linear Fresnel collector (CLFRC) system with a secondary compound parabolic collector (CPC) on thermal and flow performance coefficients. The enhancement rates of heat transfer due to varying governing parameters were compared and analyzed parametrically at Reynolds numbers in the range 5,000–13,000, employing water as the heat transfer fluid. Simulations were performed to solve the governing equations using the finite volume method (FVM) under various boundary conditions. For all Reynolds numbers, the average Nusselt number in the circular tube in the CLFRC system with ribs was found to be larger than that of the plain abs
... Show More