The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for protection efficacy. The controller of the protection system was designed to automatically activate the ICCPC when the environment of the steel structure is exposed to humidity. At a temperature range from 27 °C to 35 °C, the protection potential, current, and power showed an increase in percentage by 411 %, 688.74 %, and 2842.3 %, respectively when the humidity level rose from 10 % to 100 %. The intended spraying of sodium chloride (NaCl) solution on the structure at different concentrations from 1.5 % to 5 % showed excellent protection against corrosion, notable improvements in electrical conductivity, and reduction in resistance between the anode and cathode. The energy dispersive spectroscopy and scanning electron microscopy (SEM-EDS) analyses confirm effective corrosion inhibition under ICCPC coverage compared to unprotected areas. These tests revealed an absence of oxidation beneath the ICCPC compared with areas outside of its coverage. The areas outside of ICCPC protection showed a reduction in iron and carbon contents from 57.1 % to 47.0 % and 41.4 %–22.4 %, respectively, and an increase in oxygen from 1.6 % to 30.6 %.
Climate change in recent years has greatly affected the distribution of ground covers. Monitoring these changes has become very easy due to the development of remote sensitivity science and the use of satellites to monitor these changes. The aim of this research is to monitor changes in the spectral reflectivity of the Baghdad governorate center for the month (March, June, September, December) of the year 2021 using remote sensing and satellite images Sentinel 2 and knowing the climate imact on them. Fifty-one samples were selected for four types of ground cover (agricultural land, water, buildings and open space) and their spectral reflectivity was calculated using satellite images.
Alot of medical and industrial applications used the metal nanoparticles (NPs) with increase interest to be used as cancer therapy. The current work aimed to prepare AuNPs and AgNPs through the use of plasma jet and test their antitumor mechanism of apoptosis induction. The results indicating the face-centered cubic structures and crystalline nature of AuNPs and AgNPs. Also, the image of FESEM showed that the well dispersions regarding AuNPs and AgNPs, while the NP’s spherical shape with the particle size distributions which are considered to be close that estimated from the XRD. cytotoxicity have been assessed against the Normal embryonic cell line REF and the digestive system (HC , SK-GT-4) cell lines under a variety of the seri
... Show MoreIn the age of information and communication revolution, education as one of life aspects has influenced with that revolution by integrating technology in education, which have become as an important learning tools of the whole educational process . Technology, when used appropriately, can help make science classroom a site of active learning and critical thinking, furthering student inquiry and connections with different materials. It is necessary to develop human rights education programs and materials for discretionary and extracurricular activities as it provide them with the skills and tools so that they are empowered to take action to realize their rights. Human rights education is a critical means of instilling the knowledge، skil
... Show MoreFace recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreAbstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.
This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using
... Show MoreThis research focuses on improvement of the corrosion behaviour of commercial pure titanium (Ti) grade II when exposed to Hank’s solution through different surface treatments. The disc shape of titanium samples were constructed to be divided according to their surface treatment. The first experimental group the Ti sample was exposed to computer numerical control (CNC) fiber laser machine. Whereas, the other experimental group the Ti sample was only coated with Polyetherketon keton (PEKK) by using carbon dioxide (CO2) laser technique while the last experimental group the Ti sample was treated with CNC fiber laser followed by PEKK coating by using CO2 laser technique. All were compared with the untreated control group. The electrochemical a
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More