Preferred Language
Articles
/
ijp-864
Evaluation of polyurethane and polyurethane /polyvinyl chloride blend coatings on steel as corrosion protection using EIS technique
...Show More Authors

This paper was aimed to evaluate the polyurethane (PU) and polyurethane/polyvinyl chloride (90 wt. % / 10 wt. %) as organic coating of carbon steel substrate against marine environment (3.5 wt.% NaCl aqueous solution) as a severe corrosion environment . The electrochemical impedance spectroscopy (EIS) and fitting impedance data by ZsimpWin 3.22 software were used to estimate the physical barrier of the samples for different exposure times. Different equivalent electrical circuits were proposed for the physical barrier at different immersion times to get appropriate fitting .Both PU and PU/PVC coatings showed excellent corrosion protection ability for steel .The PU/PVC coating showed better protection and stability than PU coating against aggressive salt solution. The relation between dielectric properties (impedance spectrum) of coating film with their behavior as physical barrier protection gave useful information about electrochemical process and predicts the barrier protective behavior in natural environment.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Control the deposition uniformity using ring cathode by DC discharge technique
...Show More Authors

Simulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
A hybrid feature selection technique using chi-square with genetic algorithm
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Experimental Behavior of Steel-Concrete-Steel Sandwich Beams with Truss Configuration of Shear Connectors
...Show More Authors

This paper presents experimentally a new configuration of shear connector for Steel-Concrete-Steel (SCS) sandwich beams that is derived from truss configuration. It consists of vertical and inclined shear connectors welded together and to cover steel plates infilled with concrete. Nine simply supported SCS beams were tested until the failure under a concentrated central load (three- point bending). The beams were similar in length (1100mm), width (100mm), and the top plate thickness (4mm). The test parameters were; beam thickness (150, 200, 250, and 300mm), the bottom plate thickness (4, and 6mm), the diameter of the shear connectors (10, 12, and 16mm), and the connector spacing (100, 200, and 250mm). The test results sh

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 16 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE CAUSES OF THE PHENOMENON OF MARKETING DECEPTION AND ITS IMPACT IN THE AREAS OF CONSUMER PROTECTION/ SEARCH EXPLORATORY OF THE CONSUMERS PERSPECTIVE: THE CAUSES OF THE PHENOMENON OF MARKETING DECEPTION AND ITS IMPACT IN THE AREAS OF CONSUMER PROTECTION/ SEARCH EXPLORATORY OF THE CONSUMERS PERSPECTIVE
...Show More Authors

The research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Evaluation of the Stability and Flow of Asphalt Concrete Produced with Waste Brick Tile Powder as a Filler
...Show More Authors

The utilization of recycled brick tile powder as a replacement for conventional filler in the asphalt concrete mix has been studied in this research. This research evaluates the effectiveness of recycled brick tile powder and determines its optimum replacement level. Using recycled brick tile powder is significant from an environmental standpoint as it is a waste product from construction activities. Sixteen asphalt concrete samples were produced, and eight were soaked for a day. Samples contained 5% Bitumen, 2% to 5% brick tile powder, and conventional stone dust filler. The properties of samples were evaluated using the Marshall test. It was observed that the resistance to stiffness and deformation of asphalt concrete

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Assessment of organic carbon content in different topographic from northern Iraq using remote sensing technique and GIS
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Welding Heat Input on the Microstructure, Hardness, and Impact Toughness of AISI 1015 Steel
...Show More Authors

In the present study, MIG welding is carried out on low carbon steel type (AISI 1015) by using electrode ER308L of 1.5mm diameter with direct current straight polarity (DCSP). The joint geometry is of a single V-butt joint with one pass welding stroke for different plate thicknesses of 6, 8, and 10 mm. In welding experiments, AISI 1015 plates with dimensions of 200×100mm and edge angle of 60o from both sides are utilized. In this work, three main parameters related to MIG welding process are investigated, which are welding current, welding speed, heat input and plate thickness, and to achieve that three groups of plates are employed each one consists of three plates. The results indicate that increasing the weld heat input (t

... Show More
View Publication Preview PDF