Preferred Language
Articles
/
cBcEWJIBVTCNdQwC9azc
A Past, Present, and Prospective Review on Microwave Nondestructive Evaluation of Composite Coatings

Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to provide successful results when inspecting composite coatings. Consequently, microwave NDT techniques have emerged to compensate for the shortcomings of traditional NDT approaches. Numerous microwave NDT methods have been reported for composite coatings inspection. Although existing microwave NDT methods have shown successful inspection of composite coatings, they often face several challenges, such as low spatial image quality and extensive data interpretation. Nevertheless, many of these limitations can be addressed by utilizing microwave NDT techniques with modern technologies such as soft computing. Artificially intelligent techniques have greatly enhanced the reliability and accuracy of microwave NDT techniques. This paper reviews various traditional NDT techniques and their limitations in inspecting composite coatings. In addition, the article includes a detailed review of several microwave NDT techniques and their benefits in evaluating composite coatings. The paper also highlights the advantages of using the recently reported microwave NDT approaches employing artificial intelligence approaches. This review demonstrates that microwave NDT techniques in conjunction with artificial intelligence approaches have excellent prospects for further enhancing composite coatings inspection and assessment efficiency. The review aimed to provide the reader with a comprehensive overview of most NDT techniques used for composite materials alongside their most salient features.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Self-Repairing Technique Based on Microcapsules for Cementitious Composites- A Review

Self-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durab

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Archives Of Medicine
Crossref
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Study the Effects of Microwave Furnace Heat on The Mechanical Properties and Estimated Fatigue life of AA2024-T3

This research aims to study the effect of microwave furnace heat on the mechanical properties and fatigue life of aluminum alloy (AA 2024-T3). Four conditions were used inside microwave furnace (specimens subjected to heat as dry for 30 and 60min. and specimens subjected to heat as wet (water) for 30 and 60 min.), and compared all results with original alloy (AA 2024-T3). Tensile, fatigue, hardness and surface roughness tests were used in this investigation. It is found that hardness of dry conditions is higher than wet conditions and it increases with increasing of time duration inside microwave furnace for dry and wet conditions. Also, tensile strength has the same behavior of hardness, but it increases with decreasing

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
Scopus Crossref
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

Scopus (4)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 11 2023
Journal Name
International Journal Of Phytoremediation
Adsorption of methyl orange on low-cost adsorbent natural materials and modified natural materials: a review

Recently a large number of extensive studies have amassed that describe the removal of dyes from water and wastewater using natural adsorbents and modified materials. Methyl orange dye is found in wastewater streams from various industries that include textiles, plastics, printing and paper among other sources. This article reviews methyl orange adsorption onto natural and modified materials. Despite many techniques available, adsorption stands out for efficient water and wastewater treatment for its ease of operation, flexibility and large-scale removal of colorants. It also has a significant potential for regeneration recovery and recycling of adsorbents in comparison to other water treatment methods. The adsorbents described herein were

... Show More
Preview PDF