The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for protection efficacy. The controller of the protection system was designed to automatically activate the ICCPC when the environment of the steel structure is exposed to humidity. At a temperature range from 27 °C to 35 °C, the protection potential, current, and power showed an increase in percentage by 411 %, 688.74 %, and 2842.3 %, respectively when the humidity level rose from 10 % to 100 %. The intended spraying of sodium chloride (NaCl) solution on the structure at different concentrations from 1.5 % to 5 % showed excellent protection against corrosion, notable improvements in electrical conductivity, and reduction in resistance between the anode and cathode. The energy dispersive spectroscopy and scanning electron microscopy (SEM-EDS) analyses confirm effective corrosion inhibition under ICCPC coverage compared to unprotected areas. These tests revealed an absence of oxidation beneath the ICCPC compared with areas outside of its coverage. The areas outside of ICCPC protection showed a reduction in iron and carbon contents from 57.1 % to 47.0 % and 41.4 %–22.4 %, respectively, and an increase in oxygen from 1.6 % to 30.6 %.
Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
There are no single materials which can withstand all the extreme operating conditions in modern technology. Protection of the metals from hostile environments has therefore become a technical and economic necessity.
In this work, for enhancing their wear-resistance, boride layers were deposited on the surface of low carbon steel by a pack cementation method at 850 °C for (2, 4, and 6) h using vacuum furnace. The boronizing process was achieved using different concentration of boron source (20, 25, and 30) % wt. into coating mixture to optimize the best conditions which ensure the higher properties with lower time. The coating was characteristic by X ray diffraction (XRD), and it is confirmed t
... Show MoreThe inhibitive action of a blend of sodium nitrite/sodium hexametaphosphate (SN+SHMP) on corrosion of carbon steel in simulated cooling water systems (CWS) has been investigated by weight loss and electrochemical polarization technique. The effect of temperature, velocity, and salts concentrations on corrosion of carbon steel were studied in the absence and presence of mixed inhibiting blend. Also the effect of inhibitors blend concentrations (SN+SHMP), temperatures, and rotational velocity, i.e., Reynolds number (Re) on corrosion rate of carbon steel were investigated using Second-order Rotatable Design (Box-Wilson Design) in performing weight loss and corrosion potential approach. Electrochemical polarization measurements
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreBackground: Oral SCC is a complex malignancy where environmental factors, viral infections and genetic alterations most likely interact, and thus give rise to the malignant condition. The HSP70 play a direct role in apoptosis inhibition by aligning the improved integrity of a cell’s proteins with the improved chances of that particular cell’s survival.P21 gene produces p21 protein which is a potent cyclin-dependent kinase inhibitor that plays a significant role in carcinogenesis. The aims of the study were to evaluate and compare the immun-histochemical expression of the HSP70 and cell cycle protein p21in NOM, OED, and OSCC. Correlate both marker expressions with each other. Materials and methods: Forty six formalin-fixed, par
... Show MoreThe melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating condition
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More