Preferred Language
Articles
/
ijs-5041
Effect of Orphenadrine citrate drug on Corrosion of Stainless Steel (316L) in an Acidic Environment (Hydrochloric Acid)
...Show More Authors

    The use of varied quantities of orphenadrine to protect stainless steel against corrosion in an acidic media at 298 K has been investigated. It was observed that when the drug's concentration is increased, the drug's speed of corrosion lowers. The data of inhibition efficiency (percent IE) in the presence of orphenadrine drug and corrosion resistance showed that the highest protection efficiency was achieved with the best concentration, and that the corrosion rate decreased with increasing orphenadrine drug concentrations, making it a good inhibitor for stainless steel in an acidic environment. The theoretical investigation proved the efficiency of the drug for inhibition, as the drug is absorbed on the surface of the stainless steel by the active groups in the drug, using the hyperchem-8.07 software to compute the molecular orbital energies.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 23 2017
Journal Name
Proceedings Of The International Conference On Web Intelligence
Primarily investigating into the relationship between talent management and knowledge management in business environment
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
SDN-assisted Service Placement for the IoT-based Systems in Multiple Edge Servers Environment
...Show More Authors

Edge computing is proved to be an effective solution for the Internet of Things (IoT)-based systems. Bringing the resources closer to the end devices has improved the performance of the networks and reduced the load on the cloud. On the other hand, edge computing has some constraints related to the amount of the resources available on the edge servers, which is considered to be limited as compared with the cloud. In this paper, we propose Software-Defined Networking (SDN)-based resources allocation and service placement system in the multi-edge networks that serve multiple IoT applications. In this system, the resources of the edge servers are monitored using the proposed Edge Server Application (ESA) to determine the state of the edge s

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
A lightweight AES Algorithm Implementation for Secure IoT Environment
...Show More Authors

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (3)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
World Congress On Civil, Structural, And Environmental Engineering
Improving the Behavior of Steel Plate Shear Wall Using Double Infill Plates
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Regression Modeling of EDM Process for AISI D2 Tool Steel with RSM
...Show More Authors

In this paper, Response Surface Method (RSM) is utilized to carry out an investigation of the impact of input parameters: electrode type (E.T.) [Gr, Cu and CuW], pulse duration of current (Ip), pulse duration on time (Ton), and pulse duration off time (Toff) on the surface finish in EDM operation. To approximate and concentrate the suggested second- order regression model is generally accepted for Surface Roughness Ra, a Central Composite Design (CCD) is utilized for evaluating the model constant coefficients of the input parameters on Surface Roughness (Ra). Examinations were performed on AISI D2 tool steel. The important coefficients are gotten by achieving successfully an Analysis of V

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 15 2017
Journal Name
School Of Engineering
Development of novel demountable shear connectors for precast steel-concrete composite bridges
...Show More Authors

Two novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast

... Show More
View Publication Preview PDF