Preferred Language
Articles
/
joe-405
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks
...Show More Authors

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Interactive versatile computer programs are developed to provide the necessary system parameters data including the anode requirements, composition, rating, configuration, etc. Microsoft-Excel datasheet and Visual Basic.Net developed software were used throughout the study in the design of both cathodic protection systems.

The case study considered in this work is the eleven aboveground storage tanks farm situated in al-Shauiba refinery in southern IRAQ. The designed cathodic protection systems are to be installed and monitored realistically in the near future. Both systems were designed for a life span of (15-30) years, and all their parameters were within the internationally accepted standards.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Corrosion protection of pure titanium implant by electrochemical deposition of hydroxyapatite post-anodizing
...Show More Authors

In this study, a Hydroxyapatite (HA) coating was prepared on a titanium implant by an electrochemical deposition process. The titanium pre-treatment by anodizing in 1.65 mol/L sulfuric acid with (10V) at room temperature. The deposition was all conducted at a constant voltage of 6.0 V, for 1 h at room temperature. The coatings thus prepared were characterized with Fourier transform infrared spectroscopy (FTIR) and thickness of the coated layer.The electrochemical deposition of HA occurred on the titanium as a cathode. Coated titanium by HA after anodizing revealed a good corrosion protection efficiency even at a temperature ranged (293-323) K in artificial saliva. Activation energy and pre-exponential factor (kinetic parameters) were calcul

... Show More
View Publication Preview PDF
Scopus (14)
Scopus
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Extending the storage life of some fruits by using Pullulan produced from locally isolate Aureobasidium pullulans: Extending the storage life of some fruits by using Pullulan produced from locally isolate Aureobasidium pullulans
...Show More Authors

Six isolates of A. pullulans were collected from many sources including Hibiscus sabdariffa (Roselle), old Roofs of houses and bathroom surface that referred as Ap ros1, Ap or2, 3, 4 and Ap bs5, 6 respectively, all these isolates were identified based on morphological characteristics and nutritional physiology profiles, all were able to utilize various carbon and nitrogen sources such as glucose, xylose, sucrose, maltose, ammonium sulfate, ammonium nitrate and ammonium chloride, also they showed positive test for starch and amylase, while α-cellulose, ethanol, and methanol were could not be ass

... Show More
View Publication Preview PDF
Publication Date
Thu May 06 2021
Journal Name
Journal Of Petroleum Research And Studies
Simulation of underground storage / UM EL-Radhuma Formation-Ratawi field
...Show More Authors

The aim of this study is to investigate the feasibility of underground storage of gas in Um El-Radhuma formation /Ratawi field. This formation is an aquifer consisting of a high permeable dolomitebeds overlain by impermeable anhydrite bed of Rus formation. Interactive petrophysics (IP), Petrel REand Eclipse 100 softwares were used to conduct a well log interpretation, build a reservoir simulationmodel and predict the reservoir behavior during storage respectively. A black oil, three dimensionaland two phase fluid model has been used. The results showed that the upper part of Um El-Radhumaformation is suitable for underground gas storage, because of the seal of its cap rock and capability ofreserving gas in the reservoir. It was foun

... Show More
View Publication
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Numerical Study for the Tube Rotation Effect on Melting Process in Shell and Tube Latent Heat Energy Storage LHES System
...Show More Authors

Although renewable energy systems have become an interesting global issue, it is not continuous either daily or seasonally. Latent heat energy storage (LHES) is one of the suitable solutions for this problem. LHES becomes a basic element in renewable energy systems. LHES compensate for the energy lack when these systems are at low production conditions. The present work considered a shell and tube LHES for numerical investigation of the tube rotation influence on the melting process. The simulation and calculations were carried out using ANSYS Fluent software. Paraffin wax represents the phase change material (PCM) in this work, while water was selected to be the heat transfer fluid (HTF). The calculations were carried o

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Jul 01 2026
Journal Name
Journal Of Energy Storage
Novel multi-lobed tube designs for efficient latent thermal energy storage: A comprehensive study of single and dual-tube configurations
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Selecting the optimal movement subset with different pattern recognition based EMG control algorithms
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref