This study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a concentration found that is 1000 and 2000 ppm, the results indicate that the highest degree of inhibition for aqueous extract is 93.3% with the concentration of 2000 ppm and 90.5% with 1000 ppm at293K. While the alcoholic inhibitor shows the highest efficiency 92.4% with a concentration of 2000 ppm and 88.6% with a concentration of 1000 ppm respectively. The structure of the inhibitor was investigated using infrared spectroscopy (FTIR), and the surface morphology of the tested samples was investigated using a scanning electron microscope (SEM).
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThis study was conducted to describe a protocol for the callus establishing culture of Lavandula angustifolia plant and estimating their content of volatile oil. The quantity of volatile oil callus tissues was compared with that of leaves production. Callus was induced from leaf explants on Murashige and Skoog medium (MS) supplemented with Naphthalene acetic acid (NAA) and Benzyl adenine (BA) in different concentrations. Maximum callus fresh weight was obtained in the combination of 10 mg/L BA and 3 mg/L NAA which reached 18 g after four weeks. The results of this work showed that the quantity of volatile oil from the highest fresh weight callus was 6 ml compared with quantity of 18g of leaves which gave 0.5 ml. Volatile o
... Show MoreTRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThis paper presents experimentally a new configuration of shear connector for Steel-Concrete-Steel (SCS) sandwich beams that is derived from truss configuration. It consists of vertical and inclined shear connectors welded together and to cover steel plates infilled with concrete. Nine simply supported SCS beams were tested until the failure under a concentrated central load (three- point bending). The beams were similar in length (1100mm), width (100mm), and the top plate thickness (4mm). The test parameters were; beam thickness (150, 200, 250, and 300mm), the bottom plate thickness (4, and 6mm), the diameter of the shear connectors (10, 12, and 16mm), and the connector spacing (100, 200, and 250mm). The test results sh
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show More