The ability to inhibit corrosion of low carbon steel in a salt solution (3.5%NaCl) has been checked with three real expired drugs (Cloxacillin, Amoxicillin, Ceflaxin) with variable concentrations (0, 250, 500, 750) mg/L were examined in the weight loss. The inhibition efficiency of the Cloxacillin 750 mg/L showed the highest value (82.8125 %) and the best inhibitor of the rest of the antibiotics. The different concentrations of Cloxacillin drug (0, 250, 500, 750) mg/L and temperature (25, 35, 45, 55) oC were studied as variables with potentiodynamic polarization, Scanning Electron Microscopy (SEM) for surface morphology and electrochemical impedance spectroscopy (EIS) depending on current values and the resistance of charge to
... Show MoreUnder cyclic loading, aluminum alloys exhibit less fatigue life than steel alloys of similar strength and this is considered as Achilles's heel of such alloys. A nanosecond fiber laser was used to apply high speed laser shock peening process on thin aluminum plates in order to enhance the fatigue life by introducing compressive residual stresses. The effect of three working parameters namely the pulse repetition rate (PRR), spot size (ω) and scanning speed (v) on limiting the fatigue failure was investigated. The optimum results, represented by the longer fatigue life, were at PRR of 22.5 kHz, ω of 0.04 mm and at both v's of 200 and 500 mm/sec. The research yielded significant results represented by a maximum percentage increase in the fa
... Show MoreOptimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni
... Show MoreIn this paper we proposes the philosophy of the Darwinian selection as synthesis method called Genetic algorithm ( GA ), and include new merit function with simple form then its uses in other works for designing one of the kinds of multilayer optical filters called high reflection mirror. Here we intend to investigate solutions for many practical problems. This work appears designed high reflection mirror that have good performance with reduction the number of layers, which can enable one to controlling the errors effect of the thickness layers on the final product, where in this work we can yield such a solution in a very shorter time by controlling the length of the chromosome and optimal genetic operators . Res
... Show MoreA perturbed linear system with property of strong observability ensures that there is a sliding mode observer to estimate the unknown form inputs together with states estimation. In the case of the electro-hydraulic system with piston position measured output, the above property is not met. In this paper, the output and its derivatives estimation were used to build a dynamic structure that satisfy the condition of strongly observable. A high order sliding mode observer (HOSMO) was used to estimate both the resulting unknown perturbation term and the output derivatives. Thereafter with one signal from the whole system (piton position), the piston position make tracking to desire one with a simple linear output feedback controller after ca
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show More