An impressed current cathodic protection system (ICCP) requires measurements of extremely low-level quantities of its electrical characteristics. The current experimental work utilized the Adafruit INA219 sensor module for acquiring the values for voltage, current, and power of a default load, which consumes quite low power and simulates an ICCP system. The main problem is the adaptation of the INA219 sensor to the LabVIEW environment due to the absence of the library of this sensor. This work is devoted to the adaptation of the Adafruit INA219 sensor module in the LabVIEW environment through creating, developing, and successfully testing a Sub VI to be ready for employment in an ICCP system. The sensor output was monitored with an Arduino Uno microcontroller and the LabVIEW Linx firmware toolkit. Pulse Width Modulation (PWM) technique, which ranges from 0% to 100%, was applied by the Arduino to supply the l298N voltage driver in order to regulate the voltage input to the load. A moving average filter was employed to measure the ripple voltage averaging, and a median filter was utilized to stabilize the readings. A passive low-pass filter circuit smoothed the PWM voltage before supplying the load. The results from the MATLAB-Simulink environment showed a cut-off frequency of 2.33 Hz, ripple voltage peak to peak was 41.1 mV and a settling time of 0.157 seconds. The calibrated results of the INA219 module sensor showed an absolute voltage inaccuracy of around 2.3% at full scale. In addition, an absolute error in the current of 2.2% at 25 mA shows a gradual increase as the current increases to 7% at 43 mA, while the highest absolute error for the full scale of power was at 5.8%. The obtained measurements were highly precise, and the values of the coefficient of variation were 0.36 %, 0.28% and 0.17% for the voltage, current, and power, respectively.
A novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show MoreAs a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreHCl is separated from HCl –H2SO4 solution by membrane distillation process(MD). The flat –sheet membranes made from polyvinylidene fluoride (PVDF) and polypropylene (pp.). Plate and frame these types of membrane where used in the process. The feed is a mixture of HCl and H2SO4 acids compositions depended on metals treated object.HCl concentration increased in the permeate during the process but sulfuric acid increased gradually in the feed .During the concentration of solution acids concentrations in the feed at the beginning were 50 g/dm3 of sulfuric acid and 50 g/dm3 of hydrochloric acid at 333K feed temperature the permeate flux was 71 dm
... Show MoreSoil water retention curves (SWRCs) are crucial for characterizing soil moisture dynamics and are particularly relevant in the context of irrigation management. A study was carried out to obtain the SWRC, inflection point, S index, pore size distribution curve, macro porosity, and air capacity from samples submitted to saturation and re-saturation processes. Five different-texture disturbed soil samples Sandy Loam, Loam, Sandy Clay Loam, Silt Loam, and Clay were collected. After obtaining SWRC, each air-dried soil samples were submitted to particle size distribution and clay dispersed in water analyses to verify the soil lost clay. The experimental design was completely randomized with three replications using two processes of SWRC (saturat
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More