Preferred Language
Articles
/
WRcoCpEBVTCNdQwC9pLJ
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for protection efficacy. The controller of the protection system was designed to automatically activate the ICCPC when the environment of the steel structure is exposed to humidity. At a temperature range from 27 °C to 35 °C, the protection potential, current, and power showed an increase in percentage by 411 %, 688.74 %, and 2842.3 %, respectively when the humidity level rose from 10 % to 100 %. The intended spraying of sodium chloride (NaCl) solution on the structure at different concentrations from 1.5 % to 5 % showed excellent protection against corrosion, notable improvements in electrical conductivity, and reduction in resistance between the anode and cathode. The energy dispersive spectroscopy and scanning electron microscopy (SEM-EDS) analyses confirm effective corrosion inhibition under ICCPC coverage compared to unprotected areas. These tests revealed an absence of oxidation beneath the ICCPC compared with areas outside of its coverage. The areas outside of ICCPC protection showed a reduction in iron and carbon contents from 57.1 % to 47.0 % and 41.4 %–22.4 %, respectively, and an increase in oxygen from 1.6 % to 30.6 %.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iraqi Journal Of Physics
Monitoring Land Surface Temperature (LST) and Land Cover of Basra Province using Remote Sensing Technique and GIS
...Show More Authors

This study investigates the changes occurring in the province of Basra using geospatial methods and analyzes the variations in land surface temperature among the various types of land cover. For the months of July and December in the years 2013 and 2021, Landsat images were used in Landsat 8 OLI/TIRS, and satellite images were processed using ArcGIS 10.8 software. The study's categories for land use and land cover were generated through the application of supervised classification techniques, and the land surface temperature was calculated using data from a satellite sensor's brightness temperature. According to the study's findings, there has been an increase in urban areas (including barren land). From 2013 to 2021, a greater correlati

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Key Engineering Materials
A Comparison Study between Asymmetrical Castellated Steel Beams Encased by Reactive Powder Concrete with Laced Reinforcement
...Show More Authors

The main objectives of this study are to study the enhancement of the load-carrying capacity of Asymmetrical castellated beams with encasement the beams by Reactive Powder Concrete (RPC) and lacing reinforcement, the effect of the gap between top and bottom parts of Asymmetrical castellated steel beam at web post, and serviceability of the confined Asymmetrical castellated steel. This study presents two concentrated loads test results for four specimens Asymmetrical castellated beams section encasement by Reactive powder concrete (RPC) with laced reinforcement. The encasement of the Asymmetrical castellated steel beam consists of, flanges unstiffened element height was filled with RPC for each side and laced reinforced which are use

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Conference Proceedings Of The Society For Experimental Mechanics Series
A comparative study of mode decomposition to relate next-ERA, PCA, and ICA modes
...Show More Authors

This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using

... Show More
Scopus (1)
Scopus
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Frustrations of sectarian coexistence and mechanisms to activate peaceful coexistence: Iraq as a model
...Show More Authors

Abstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Psychophysiological Control in Behavior
...Show More Authors

         The Feedback Concept has been spread as an organized trend for scientific research since it has a significant importance for human behavior and how it has been directed and controlled by the individual, feedback has numerous definitions but the simplest definition is; feedback is the information received by the individual from the output of his behavior, In addition to the mutual relationship between the individual and the stimulation that provide him with the basic information by the biological control of his behavior, Since feedback cannot be accomplished without receiving information from the inner and outer environment, the biological and physiological information become the ma

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref