The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for protection efficacy. The controller of the protection system was designed to automatically activate the ICCPC when the environment of the steel structure is exposed to humidity. At a temperature range from 27 °C to 35 °C, the protection potential, current, and power showed an increase in percentage by 411 %, 688.74 %, and 2842.3 %, respectively when the humidity level rose from 10 % to 100 %. The intended spraying of sodium chloride (NaCl) solution on the structure at different concentrations from 1.5 % to 5 % showed excellent protection against corrosion, notable improvements in electrical conductivity, and reduction in resistance between the anode and cathode. The energy dispersive spectroscopy and scanning electron microscopy (SEM-EDS) analyses confirm effective corrosion inhibition under ICCPC coverage compared to unprotected areas. These tests revealed an absence of oxidation beneath the ICCPC compared with areas outside of its coverage. The areas outside of ICCPC protection showed a reduction in iron and carbon contents from 57.1 % to 47.0 % and 41.4 %–22.4 %, respectively, and an increase in oxygen from 1.6 % to 30.6 %.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating condition
... Show MoreIn the age of information and communication revolution, education as one of life aspects has influenced with that revolution by integrating technology in education, which have become as an important learning tools of the whole educational process . Technology, when used appropriately, can help make science classroom a site of active learning and critical thinking, furthering student inquiry and connections with different materials. It is necessary to develop human rights education programs and materials for discretionary and extracurricular activities as it provide them with the skills and tools so that they are empowered to take action to realize their rights. Human rights education is a critical means of instilling the knowledge، skil
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Background:Sun protection is one of the most important steps of skin care as it is necessary to protect the skin from ultraviolet rays that is known to cause number of harmful effects on the skin in long and frequent exposure. Objective:To assess the awareness of the medical students regarding sun exposure and its harm,study their sun protection attitudes,practices, their use of sunscreens, and to know if they can share information to other people to encourage such important protective methods and behaviours which are not well established in our community.Patients and method:This cross-sectional descriptive study included 300 students both females and males of fourth and fifth grade of College of Medicine in university of Baghdad.Results:M
... Show MoreIn this research project, a tip-tilting angle of a photovoltaic solar cell was developed to increase generated electrical power output. An active, accurate, and simple dual-axis tracking system was designed by using an Arduino Uno microprocessor. The system consisted of two sections: software and apparatus (hardware). It was modified by using a group of light-dependent resistor sensors, and two DC servo motors were utilized to rotate the solar panel to a location with maximum sunlight. These components were arranged in a mechanical configuration with the gearbox. The three locations of the solar cell were chosen according to the tilt angle values, at zero angles, which included an optimal 33-degree angle for the Baghdad location and
... Show More