Preferred Language
Articles
/
ijcpe-240
Performance of Corrosion Inhibitors Blend for Simulated Industrial Cooling Waters under Dynamic Conditions
...Show More Authors

   The inhibitive action of a blend of sodium nitrite/sodium hexametaphosphate (SN+SHMP) on corrosion of carbon steel in simulated cooling water systems (CWS) has been investigated by weight loss and electrochemical polarization technique. The effect of temperature, velocity, and salts concentrations on corrosion of carbon steel were studied in the absence and presence of mixed inhibiting blend. Also the effect of inhibitors blend concentrations (SN+SHMP), temperatures, and rotational velocity, i.e., Reynolds number (Re) on corrosion rate of carbon steel were investigated using Second-order Rotatable Design (Box-Wilson Design) in performing weight loss and corrosion potential approach. Electrochemical polarization measurements were used to study the behavior of carbon steel in different salts concentrations of (CWS) with pH = 7.5 in absence and presence of the inhibiting blend. The results show that the regression model (Box-Wilson Design) that has been developed using experimental data was used to verify that the interaction term of temperature with inhibitors blend and the square term of inhibitors blend are significant for corrosion rate in 0.05 N NaCl solution while the main variables are not pronounced. Also, it is found that the corrosion rate of carbon steel is increased with increasing temperature, rotational velocity, and NaCl salts concentration in uninhibited and inhibited solutions. Inhibition performance of NaNO2+ Na(PO3)6  was found to increase with its concentration up to 800 ppm inhibitors blend, and the corrosion potential is shifted to more positive direction with increasing rotational velocity, and inhibitor blend concentration.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Ferritin Levels for Iraqi Patients with Hashimoto's Thyroiditis
...Show More Authors

Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
New Approach for Solving (1+1)-Dimensional Differential Equation
...Show More Authors

View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Vertical Stress Prediction for Zubair Oil Field/ Case Study
...Show More Authors

Predicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Aluminum Rubbish as a Coagulant for Oily Wastewater Treatment
...Show More Authors

In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 Ieee/acs 15th International Conference On Computer Systems And Applications (aiccsa)
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Crossref