The aim of this research is to calculate mass transfer coefficient, kd, during cathodic protection of low carbon steel in neutral seawater (3.5% W/V NaCl in distilled water with pH = 7). Two types of cathodic protection were used:
First: Sacrificial anode cathodic protection (SACP) were a pipeline of steel carrying seawater using zinc as a sacrificial anode and with variable temperatures ranged (0 – 45oC) and volumetric flow rate ranged (5 – 900 lit/hr). It was found that the kd increases with increasing temperature and volumetric flow rate of seawater, where kd ranged (0.24×10-6 – 41.6×10-6 m/s).
Second: Impressed current cathodic pr
... Show MoreIn this study, dependence of gamma-ray absorption coefficient on the size of Pb particle size ranging from 200µm up to 2.5mm, using different weights of each particle size. The results show that gamma-ray attenuation coefficient is inversely proportional with the size of Pb particle size due to the reduction of the spaces between the lead particles.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe current work is characterized by simplicity, accuracy and high sensitivity Dispersive liquid - Liquid Micro Extraction (DLLME). The method was developed to determine Telmesartan (TEL) and Irbesartan (IRB) in the standard and pharmaceutical composition. Telmesartan and Irbesartan are separated prior to treatment with Eriochrom black T as a reagent and formation ion pair reaction dye. The analytical results of DLLME method for linearity range (0.2- 6.0) mg /L for both drugs, molar absorptivity were (1.67 × 105- 5.6 × 105) L/ mole. cm, limit of detection were (0.0242and0.0238), Limit of quantification were (0.0821and0.0711), the Distribution coefficient were
... Show MoreThe bauxite produced from Al-Ga 'ara area in Al-Enbar containing 50.4 wt. percentages Al2O3 was used for a- alumina production.
For α-alumina pro
... Show MoreBackground: In the traditional protocol, the patient should wait after extraction up to six months to place the dental implant in healed bone, this waiting time accompanied by varying degrees of alveolar bone changes. In order to overcome these problems, immediate implant placement in the fresh extraction socket was introduced. The Aim of this study was to evaluate the outcome of the immediate implant placement utilizing Resonance Frequency Analysis (RFA) to quantify implant stability and osseointegration. Materials and Methods: A total of (23) patients participated in the study, receiving (44) implants placed in the sockets of teeth indicated for extraction. Clinical and radiographic preoperative assessment was accomplished for each patie
... Show MoreFacial emotion recognition finds many real applications in the daily life like human robot interaction, eLearning, healthcare, customer services etc. The task of facial emotion recognition is not easy due to the difficulty in determining the effective feature set that can recognize the emotion conveyed within the facial expression accurately. Graph mining techniques are exploited in this paper to solve facial emotion recognition problem. After determining positions of facial landmarks in face region, twelve different graphs are constructed using four facial components to serve as a source for sub-graphs mining stage using gSpan algorithm. In each group, the discriminative set of sub-graphs are selected and fed to Deep Belief Network (DBN) f
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More 
        