Preferred Language
Articles
/
joe-1486
Estimating Pitting Corrosion Depth and Density on Carbon Steel (C-4130) using Artificial Neural Networks
...Show More Authors

The purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be quite effective; the results were validated by the experimental agreement with those acquired from laboratory tests. Specifically, the correlation coefficient, R = 0.9944.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Anodic Polarization of Mild Steel in Saturated C a(OH)2 Contaminated with NaCl in Presence of NaNO2
...Show More Authors

The corrosion  behavior  of mild sleet  in saturated  aerated  and de-aerated  Ca(OH)2 solution  was  investigated  using electrochemical measurements. The work was carried out with small coupons immersed in solutions containing different quantities of NaCl in presence of various NaN02 concentrations as corrosion inhibitors. It has been found thal:(1 ) In presence  of NaCl,  the time required  to reach O2  evolution potential  in de-aerated  Ca(OH)2 polarized  at  10μA/cm 2 is function of inhibitor concentration and it becomes lass as NaN02 increases compared with zero presence indicating the effectiveness of N

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Exposure and etching time effects on the fission track density in CR-39 detectors using teeth samples
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Hard Chromium Electroplating and Improvement the Properties by the Thermo Chemical Treatments (Solid Carburizing) of Low Carbon Steel
...Show More Authors

In this research the hard chromium electroplating process, which is one of the common methods of overlay coating was used, by using chromium acid as source of chromium and sulphuric acid as catalyst since the ratio between chromic acid and sulphuric acid is (100 : 1) consequently. Plating process was made by applying current of density (40 Amp / dm2) and the range of solution temperature was (50 – 55oC) with different time periods (1-5 hr). A  low carbon steel type (Ck15) was used as substrate for hard chromium electroplating. Solid carburization was carried out for hard chromium plating specimen at temperature (925oC) with time duration (2 hr) to be followed with quenching and tempering

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Comparison Study of Electromyography Using Wavelet and Neural Network
...Show More Authors

In this paper we present a method to analyze five types with fifteen wavelet families for eighteen different EMG signals. A comparison study is also given to show performance of various families after modifying the results with back propagation Neural Network. This is actually will help the researchers with the first step of EMG analysis. Huge sets of results (more than 100 sets) are proposed and then classified to be discussed and reach the final.

View Publication Preview PDF
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Generating pairwise combinatorial test set using artificial parameters and values
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Crossref (6)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Research In Medical And Dental Science
The Effect of Adding Poloxamer Surfactant on the Penetration Depth of NaOCl and NaOH into Dentinal Tubules
...Show More Authors

Objectives: The purpose of this in vitro study was to compare the effect of adding poloxamer surfactant to irrigant solutions on the penetration de..

View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Effect of Embedment Depth on Raft Foundation Settlement Under Seismic Load
...Show More Authors
Abstract<p>Dynamic loads highly influence soil properties and may cause real damage to structures and buildings. This article reports the experimental results from 24 tests to study the settlement of flexible and rigid raft foundation with different embedment depth rested on dense sandy soil. A small scale building model of dimension 200*200 mm and 320 mm in height was performed with reinforced concrete raft foundation of 10 mm thickness for flexible raft and 23 mm for rigid raft, The shaking table technique was used to simulate the seismic effect, the shaker was sat to give three different excitation frequencies 1,2,and3 Hz and displacement amplitude equal to 13 mm, the foundation was placed at</p> ... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref