The driving idea for the present work was to combine the effect of polyvinyl alcohol (PVA) as corrosion inhibitor with the distance between the anodic and cathodic elements of the galvanic cell, beside their area ratio, in scope of synergistic suppression of galvanic corrosion on Cu/Fe model couple, using weight loss method. The performance affecting galvanic corrosion process has been tested for three major factors affect the process:
1. Four PVA inhibitor concentrations were selected to be (0, 1000, 4000 and 7000 ppm) in simulated cooling water.
2. Two cathode: anode area ratios as 1:1 and 2.4:1.
3. Two distances apart cathode – anode as 3 and 7 cm.
Maximum corrosion inhibition achieved was 86% which indicates that increasing inhibitor concentration leads to decrease dissolution process followed hydrogen evaluation Cu electrode as cathode element in galvanic cell.
A factorial experiment was applied with four replicates on rosemary plants (Rosmarinus officinalis L.) grown in pots inside the glasshouse of the Department of Biology, College of Science, Salahaddin University, Erbil, Iraq, during April, 2019 to July, 2020, to determine the effects of soil moisture content ( SM1: 100% and SM2: 60% field capacity), nitrogen fertilizer (N1: 100, N2: 200 and N3: 300kg/hectare), and magnesium fertilizer (Mg1: 0.0, Mg2: 30 and Mg3: 60kg/hectare) and their interactions on some growth characteristics and essential oil content of rosemary plants. Two cuttings were taken from rosemary shoots (on March, 2020 and July, 2020) after 12 and 15 months of planting respectively. Results showed that cutting 1:
... Show MoreRe-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c
The aim of this study was the discrimination of Salmonella isolated from chicken and their feed and drinking water for the epidemiological control of salmonellosis. Totally, 289 samples, including 217 chicken cloaca swabs, 46 water, and 26 feed samples were collected from five different farms in Karbala governorate, Iraq. Conventional bacteriology tests, API 20E, Vitek 2, and serology were used for bacterial identification. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to analyze the genetic relationships among Salmonella isolates. The isolation rate of Salmonella spp. was 21.1% (61/289). While the water samples constituted the highest rate (30.4%), a rate of
... Show MoreA field experiment was conducted to grow the wheat crop during the fall season 2020 in Karbala province, north of Ain Al-Tamr District in two locations of different textures and parent materials. The first site (calcareous soil) with a sandy loam texture, is located at (44° 40′ 37′) east longitude and (32° 41′ 34′) north latitude, at an altitude of 32 m above sea level, and an area of 20 hectares. As for the second location (gypsum soil) with a loam texture, it is located at a longitude (45° 41′ 39′) east and a latitude (33° 43′ 34′ north) and at an altitude of 33 m above sea level and an area of 20 hectares. To find out the effect of different tillage systems on water productivity and wheat yield under center pivot irri
... Show MoreWater produced from power plants is one of the most important sources of water pollution, especially for areas like Baghdad, Contaminated industrial wastewater is a major environmental challenge due to the rapid growth of industries, leading to increased accumulation of harmful pollutants in water resources, the work is intended to study the impact of water generated from a power plant in the south on the level of heavy metals before and after the treatment process and after its discharge to the Tigris River. Objective is to determine the extent of heavy metals such as iron, copper, chromium, and zinc concentration in water extracted from various points and subsequently study the monthly variations of these elements with a view to assessmen
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More