An impressed current cathodic protection system (ICCP) requires measurements of extremely low-level quantities of its electrical characteristics. The current experimental work utilized the Adafruit INA219 sensor module for acquiring the values for voltage, current, and power of a default load, which consumes quite low power and simulates an ICCP system. The main problem is the adaptation of the INA219 sensor to the LabVIEW environment due to the absence of the library of this sensor. This work is devoted to the adaptation of the Adafruit INA219 sensor module in the LabVIEW environment through creating, developing, and successfully testing a Sub VI to be ready for employment in an ICCP system. The sensor output was monitored with an Arduino Uno microcontroller and the LabVIEW Linx firmware toolkit. Pulse Width Modulation (PWM) technique, which ranges from 0% to 100%, was applied by the Arduino to supply the l298N voltage driver in order to regulate the voltage input to the load. A moving average filter was employed to measure the ripple voltage averaging, and a median filter was utilized to stabilize the readings. A passive low-pass filter circuit smoothed the PWM voltage before supplying the load. The results from the MATLAB-Simulink environment showed a cut-off frequency of 2.33 Hz, ripple voltage peak to peak was 41.1 mV and a settling time of 0.157 seconds. The calibrated results of the INA219 module sensor showed an absolute voltage inaccuracy of around 2.3% at full scale. In addition, an absolute error in the current of 2.2% at 25 mA shows a gradual increase as the current increases to 7% at 43 mA, while the highest absolute error for the full scale of power was at 5.8%. The obtained measurements were highly precise, and the values of the coefficient of variation were 0.36 %, 0.28% and 0.17% for the voltage, current, and power, respectively.
Sodium Dodecyle Sulphate (CH3(CH2)11SO4-Na+) solution was used as a secondary oil recovery by using a lab Model shown in figure-1. The effect of (solution concentration, temperature and salinity) on interfacial tension figure-2 and figure-3 and figure-4 respectively. The best values of these three variables, were taken (those values that give the lowest interfacial tension). Porosity, saturation, permeability were determined in the lab depending on Darcy law. Primary oil recovery was displaced by water until no more oil is obtained then sodium dodecyle sulphate solution was injected. The total oil recovery was 94.8% or 85.7% of the residual oil (secondary oil recovery) figure-5. This method was applied on Iraqi oil field and it gave resu
... Show MoreThe current research aims through its chapters to verify the relationship and impact of strategic leadership as an independent variable in the marketing performance as a respondent variable, in a leap cement plant, and try to come up with a set of recommendations that contribute to enhancing the practice and adoption of the two variables in the organization under discussion. And based on the importance of the research topic to the community, and to the researched organization and its members, the analytical and analytical approach was adopted in the completion of this research, and the research community included a leap cement plant in Anbar Governorate, while the research sample was represented by (department heads, and people o
... Show MoreDeveloping an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreBackground:Nipple discharge is a relatively common complaint of females in reproductive age and after menopause.
Objectives: The aim of this stud was to compare the radiological findings of mammography and ultrasound in women with pathological nipple discharge of different pathology.
Methods: mammography and ultrasound was done for a total of 50 patients attending the National center of Early detection of Breast cancer with pathological nipple discharge. Ultrasound guided FNA was performed for all cases, and histopathology was available for eleven case.
Results: ultrasound was able to provide clue of possible underlying cause for all pathological nipple discharge whereas mammography was negative in 54%
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In this research, we make an attempt to derive theoretically 1-D linear dispersion relation of ion-acoustic waves in uniform unmagnetized dusty plasma valid in the long wavelength limits. This equation matched previously special equation of acoustic modes of a general form in magnetized dusty plasma. Depending on previously mentioned experimental data, we numerically consider various parameters that affect the properties of these waves in dusty plasma. The study has shown that the presence of dust grains is to modify the properties of ion acoustic waves and affect the behavior of the plasma in which they are immersed.