Preferred Language
Articles
/
alkej-353
Evaluations of Potable Water Tanks Epoxy Coatings Performance Using Electrochemical Impedance Spectroscopic Method
...Show More Authors

Abstract  

The aim of this paper is to investigate and discuss the mechanisms of corrosion of epoxy coatings used for potable water tanks. Two distinct types of Jotun epoxy coatings: Tankguard 412 contained polyamine cured epoxy and Penguard HB contained polyamide cured epoxy, were tested and studied using the electrochemical impedance spectroscopic (EIS) method. The porosity of epoxy coatings was determined using EIS method. The obtained results showed that the two epoxy coatings have excellent behavior when applied and tested in potable water of Basrah city. Polyamine is more resistance to water corrosion compared to polyamide curing epoxy and has high impedance values. Microscopic inspection after test showed that the polyamine cured epoxy has blistering while the surface of polyamide cured epoxy showed pitting and blisters.

KeywordsCorrosion mechanism , epoxy coats, porosity, potable water, , EIS method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Al-academy
طريقة عمل قالب رملي معالج مع مادة الرزن لإنتاج مصبوبات برونزية
...Show More Authors
أن استخدام طريقة الشمع المفقود و الصب بالرمل كان ولا يزال ، قديماُ و تقنياته قديمة وغير مطورة لذا تم التركيز على طريقة الصب بالرمل الذي أعتاد الحرفيون ، غالباً على أستخدامه لسهولة عمله وتدني الكلفته ، ولكن تبقى هذه القوالب محدودة الإمكانيات و كفاءتها محدودة و تنهدم بسهولة ولا يمكن نقلها أو تحريكها من مكان لآخر .ولكن باستخدام مادة البولستر رزن كرابط مع رمل المقالبة هو العنصر الجديد الذي سيحسن كثي
... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Environment Effects of Fish Cages Farming in the Euphrates River at Mysayyib District on Water Quality at the Farms and at the Myssayyib Water Purification Stations-2013
...Show More Authors

    The present study aimed to investigate the effects of cages of fish farming of Mussayyib district,The fish farming have been selected at Euphrates river with in Mussayyib districtBabylon province the area of study extend 3 Km at the river and includes 541 cages in water with in 46 fish farming . Water samples were taken from 3 stations three times within one month for each two of them were taken from two water purification stations in mussayyib ,physical and chemical examination of water quality were taken ,The results for samples from the fish farming indicated that PH and salinity of water within acceptable levels, high proporation of dissolved oxygen and vital oxygen required were very high while the turbidity was more t

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2000
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of the Fluidized-Beds Adsorbers
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of Countercurrent Flow Cooling Towers
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Thu Jan 01 2009
Journal Name
2009 Wri International Conference On Communications And Mobile Computing
Optimization of Cooperation Sensing Spectrum Performance
...Show More Authors

Cooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF