The present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , water concentration and temperature. The output is average corrosion rate .The performance of the two training algorithms, gradient descent with momentum and Levenberg-Marquardt, are compared to select the most suitable training algorithm for corrosion rate model. The model can be used to calculate the average corrosion rate properties of carbon steel alloy as functions of Reynolds number, water concentration and temperature. Accordingly, the combined influence of these effective parameters and the average corrosion rate is simulated. The results show that the corrosion rate increases with the increase of temperature, Reynolds number and the increase of water concentration.
Corrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both
... Show MoreObjective: The aim of this study is to evaluate anemia among lactating women and their children less than 2 years of
age.
Methodology: The study was done on (148) lactating mothers and their children under 2 years of age in the primary
health care center at AL-Salam Quarter/Baghdad from l/10/2009 to 15/10/2010.
Result: This study recommends that there is a significant relationship between anemic mothers and their children. The
study also revealed that there is (77.8%) from nursing mothers in the age groups (25-29) who suffered from anemia,
while (23.1%) for the age group (20-24) did not have anemia
Recommendation: We encourage the use of breast milk or iron-fortified infant formula only for any milk-based part
of
The aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended
... Show MoreJournal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author
... Show MoreNow-a-days the Flexible AC Transmission Systems (FACTS) technology is very effective in improving the power flow along the transmission lines and makes the power system more flexible and controllable. This paper deals with the most robust type of FACTS devices; it’s a Unified Power Flow Controller (UPFC). Many cases have been taken to study how the system behaves in the presence and absence of the UPFC under normal and contingency conditions. The UPFC is a device that can be used to improve the bus voltage, increasing the loadability of the line and reduce the active and reactive power losses in the transmission lines, through controlling the flow of real and reactive power. Both the magnitude and the phase angle of th
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis work is concerned with a two stages four beds adsorption chiller utilizing activated carbon-methanol adsorption pair that operates on six separated processes. The four beds that act as thermal compressors are powered by a low grade thermal energy in the form of hot water at a temperature range of 65 to 83 °C. As well as, the water pumps and control cycle consume insignificant electrical power. This adsorption chiller consists of three water cycles. The first water cycle is the driven hot water cycle. The second cycle is the cold water cycle to cool the carbon, which adsorbs the methanol. Finally, the chilled water cycle that is used to overcome the building load. The theoretical results showed that average cycle cooling power
... Show More