Faculty of Technoscience
Permanent URI for this community
Browse
Browsing Faculty of Technoscience by Title
Now showing 1 - 20 of 46
Results Per Page
Sort Options
Item A survey on artificial intelligence in cybersecurity for smart agriculture: state-of-the-art, cyber threats, artificial intelligence applications, and ethical concerns.(Mesopotamian Academic Press, Imam Ja'afar Al-Sadiq University, 2024-07-20) Ali, Guma; Mijwil, Maad M.; Buruga, Bosco Apparatus; Abotaleb, Mostafa; Adamopoulos, IoannisWireless sensor networks and Internet of Things devices are revolutionizing the smart agriculture industry by increasing production, sustainability, and profitability as connectivity becomes increasingly ubiquitous. However, the industry has become a popular target for cyberattacks. This survey investigates the role of artificial intelligence (AI) in improving cybersecurity in smart agriculture (SA). The relevant literature for the study was gathered from Nature, Wiley Online Library, MDPI, ScienceDirect, Frontiers, IEEE Xplore Digital Library, IGI Global, Springer, Taylor & Francis, and Google Scholar. Of the 320 publications that fit the search criteria, 180 research papers were ultimately chosen for this investigation. The review described advancements from conventional agriculture to modern SA, including architecture and emerging technology. It digs into SA’s numerous uses, emphasizing its potential to transform farming efficiency, production, and sustainability. The growing reliance on SA introduces new cyber threats that endanger its integrity and dependability and provide a complete analysis of their possible consequences. Still, the research examined the essential role of AI in combating these threats, focusing on its applications in threat identification, risk management, and real-time response mechanisms. The survey also discusses ethical concerns such as data privacy, the requirement for high-quality information, and the complexities of AI implementation in SA. This study, therefore, intends to provide researchers and practitioners with insights into AI’s capabilities and future directions in the security of smart agricultural infrastructures. This study hopes to assist researchers, policymakers, and practitioners in harnessing AI for robust cybersecurity in SA, assuring a safe and sustainable agricultural future by comprehensively evaluating the existing environment and future trends.Item Analysing the connection between ai and industry 4.0 from a cybersecurity perspective: defending the smart revolution(Mesopotamian Journal of Big Data, 2023-05-05) Bala, Indu; Mijwil, Maad M.; Ali, Guma; Sadıkoğlu, EmreIn recent years, the significance and efficiency of business performance have become dependent heavily on digitization, as jobs in companies are seeking to be transformed into digital jobs based on smart systems and applications of the fourth industrial revolution. Cybersecurity systems must interact and continuously cooperate with authorized users through the Internet of Things and benefit from corporate services that allow users to interact in a secure environment free from electronic attacks. Artificial intelligence methods contribute to the design of the Fourth Industrial Revolution principles, including interoperability, information transparency, technical assistance, and decentralized decisions. Through this design, security gaps may be generated that attackers can exploit in order to be able to enter systems, control them, or manipulate them. In this paper, the role of automated systems for digital operations in the fourth industrial revolution era will be examined from the perspective of artificial intelligence and cybersecurity, as well as the most significant practices of artificial intelligence methods. This paper concluded that artificial intelligence methods play a significant role in defending and protecting cybersecurity and the Internet of Things, preventing electronic attacks, and protecting users' privacy.Item Arduino based smart energy saving system in Ugandan public universities: a case study of Muni university(International Journal of Innovative Research and Development, 2019-06) Nkamwesiga, Lawrence; Kazibwe, Julius Junior; Male, PaulThe application of internet of things in the real world offers numerous benefits including smart homes and offices, a technology that does not only save energy but also saves money. Office automation is becoming popular due to its numerous benefits as applied in the world of internet of things. The specific objectives of the study were: to assess the current energy usage, identify current energy saving measures, and design and implement a smart energy saving system for Muni University. System requirements were collected from the respondents who were staff of Muni University. The study considered 2 respondents from estates office, 2 from procurement, 1 from each of the three departments of education, Computer and Information Science, and Nursing Sciences. User requirements were gathered a qualitative protocol using focus group discuss and thematic analysis technique was employed. Heterogeneous home automation systems and technologies were considered in review with central controller-based Arduino, sensors, web based, email, Bluetooth, mobile, SMS, ZigBee, Dual Tone Multi Frequency, and cloud based. The study design utilized the Global system for mobile communication technology as a user interface using SMS based communication with Arduino as the central controller. The system supports internet of things concept that can be applied in saving electrical energy usage in public places including public universities. The study further recommends the Ugandan government to advocate for Arduino Based Smart Energy Saving System that can reduce electrical energy expenditure in Ugandan public universities Muni University inclusive.Item Artificial intelligence in corneal topography: A short article in enhancing eye care(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2023-06-17) Ali, Guma; Eid, Marwa M.; Ahmed, Omar G.; Abotaleb, Mostafa; Alaabdin, Anas M. Zein; Buruga, Bosco ApparatusThe eye is a critical part of the human being, as it provides complete vision and the ability to receive and process visual details, and any deficiency in it may affect vision and loss of sight. Corneal topography is one of the essential diagnostic tools in the field of ophthalmology, as it can provide important information about the cornea and the problems that appear in it. Artificial intelligence strategies contribute to the development of the healthcare domain through a group of approaches that have a significant and vital impact on improving the field of ophthalmology. The primary purpose of this paper is to highlight the efficiency of artificial intelligence in extracting features from corneal topography and how these techniques contribute to helping ophthalmologists diagnose corneal topography. Furthermore, the focus is on the performance of AI algorithms, their diagnostic capabilities, and their importance in helping physicians and patients. The effects of this paper confirm the effectiveness and efficiency of artificial intelligence algorithms in the clinical diagnosis of various eye concerns.Item Artificial intelligence solutions for health 4.0: overcoming challenges and surveying applications(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2023-03-10) Al-Mistarehi, Abdel-Hameed; Mijwil, Maad M.; Filali, Youssef; Bounabi, Mariem; Ali, Guma; Abotaleb, MostafaIn recent years, the term Health 4.0 has appeared in health services and is related to the concept of Industry 4.0. The term Health 4.0 focuses on replacing traditional care in hospitals and medical clinics with home health services that are based on artificial intelligence techniques through the use of telemedicine applications that allow the monitoring of patients in a virtual environment. This term is utilized to represent digital change in the healthcare sector. Governments aim to develop the level of medical care in hospitals and clinics to ensure the provision of healthcare benefits at low costs and increase patient satisfaction. It has become vital for hospitals to grow their environment into digital environments in their services through the use of a set of computer programs based on artificial intelligence. Artificial intelligence techniques in Health 4.0 provide a set of procedures that benefit patients and healthcare workers, including early diagnosis, make inquiries into treatment, data analysis, reports on the patient's condition, and others. The primary purpose of this article is to determine the significance of Health 4.0 and AI techniques in healthcare by mentioning the most important benefits and weaknesses of using AI techniques in healthcare.Item Assessing organisational information systems security by human insiders in private and public universities in Uganda(IMPACT: International Journal of Research in Engineering & Technology, 2015) Businge, Phelix MbabaziInformation system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations. The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also identified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75). The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented. The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors.Item Assessment of how users perceive the usage of biometric technology applications(IntechOpen, 2022-07-27) Habibu, Taban; Luhanga, Edith; Sam, AnaelBiometrics applications are progressively widespread as a means of authenticating end-users owing to the extensive range of benefits over traditional authentication (token-base-authentication). However, the transaction involves taking into account the perceptions and responses of end-users. If end-users are fearful, hesitant about these biometric technology-applications, misuse and implementation-complications can surely overshadow. The goal of this study is to sightsee the user’s-motivation, understanding, consciousness and acceptance towards utilization of biometric technology-applications. A 300-person survey was conducted to evaluate public-opinion on the use and adoption of biometrics. Stratified sample technique was used to administer the surveys. The results presented that perceived ease-of-use, user-motivation and attitude are more important-factors when deciding whether to accept new technology-applications. Although many end-users have become more familiar with biometric technology-applications (e.g., Fingerprints or facial-recognition), many individuals still have a negative-perception of the technology. Concerns regarding confidentiality and security i.e., storing and protecting personal-identification data, the fear of intruding into a person’s daily-life and disclosing personal-information remain a major problem. Some end-users claim that despite the potential resilience to biometrics, designers must mentally and psychologically prepare the general public for the new use of biometric technology. This will make it possible to transform negative user-perceptions into a positive-experience. Thus, this study can help end-users and companies understand and make the right decisions to promote the use of biometric-applications and services. The study is expected to be an important research-discovery that will greatly contribute to Uganda’s digital-economy.Item Comparative analysis of PWM AC choppers with different loads with and without neural network application.(Wasit Journal of Computer and Mathematics Science, 2023-09) Bounab, Mariem; Ali, GumaIn this paper, we focus on the "Artificial Neural Network (ANN) based PWM-AC chopper". This system is based on the PWM AC chopper-encouraged single-phase induction motor. The main purpose of this paper is to design and implement an ideal technique regarding speed control. Here analyzed PWM-based AC-AC converter with resistive load, R-L load and finally, the PWM AC chopper is fed to single phase induction for speed control. Using other soft computing and optimization techniques such as Artificial Neural Networks, Fuzzy Logic, Convolution algorithm, PSO, and Neuro Fuzzy can control the Speed. We used Artificial Neural Network to control the Speed of the PWM-AC Single phase induction motor drive. The Neural Network toolbox has been further used for getting desired responses. Neural system computer programs are executed in MATLAB. The performance of the proposed method of ANN system of PWM AC Chopper fed single phase induction motor drive is better than other traditional and base methods for controlling the Speed, based on the MOSFET.Item A Comprehensive review on cybersecurity issues and their mitigation measures in FinTech(Al-Iraqia Univeristy, 2024-06-10) Ali, Guma; Mijwil, Maad M.; Buruga, Bosco Apparatus; Abotaleb, MostafaThe fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation, "financial technologies (FinTech), around the globe. However, the security of FinTech systems and networks remains critical. This research paper comprehensively reviews cybersecurity issues and their mitigation measures in FinTech. Four independent researchers reviewed relevant literature from IEEE Xplore, ScienceDirect, Taylor & Francis, Emerald Insight, Springer, SAGE, WILEY, Hindawi, MDPI, ACM, and Google Scholar. The key findings of the analysis identified privacy issues, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, cryptojacking, supply chain attacks, advanced persistent threats, zero-day attacks, salami attacks, man-in-the-middle attacks, SQL injection, and brute-force attacks as some of the significant cybersecurity issues experienced by the FinTech industry. The review paper also suggested authentication and access control mechanisms, cryptography, regulatory compliance, intrusion detection and prevention systems, regular data backup, basic security training, big data analytics, use of artificial intelligence and machine learning, FinTech regulatory sandboxes, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems as mitigation measures for cybersecurity issues. However, tackling cybersecurity issues will be paramount if FinTech is to realize its full potential. Ultimately, this research will help develop robust security mechanisms for FinTech systems and networks to achieve sustainable financial inclusion.Item Computerized private students’ admission system: a case study of Muni university(International Journal of Science and Research (IJSR), 2017) Taban, Habibu; Draku, JobAdmission of students into any institution of learning such as Muni University is a core activity. Every academic institution needs students to exist and survive. Thus an admission system of a University needs to be efficient and effective in order to avoid unnecessary delays and losses associated with such delays and inefficiencies. The aim of this paper was undertaken to design and develop the under-graduate Private Students’ Admission System at Muni University. The system targets at quickening and simplifying the process of admitting students into the University on private scheme. The data was mainly collected through interviews and document reviews followed by a design in Unified Modelling Language (UML) to meet the admission system requirements. The system was developed using Python, PHP, HTML, JavaScript and MySQL. The system was tested numerous times with real data by the department of Academic Registrar, Muni University.Item Cybersecurity for sustainable smart healthcare: State of the Art, taxonomy, mechanisms, and essential roles(Mesopotamian Journal of CyberSecurity, 2024-05-23) Ali, Guma; Mijwil, Maad M.Cutting-edge technologies have been widely employed in healthcare delivery, resulting in transformative advances and promising enhanced patient care, operational efficiency, and resource usage. However, the proliferation of networked devices and data-driven systems has created new cybersecurity threats that jeopardize the integrity, confidentiality, and availability of critical healthcare data. This review paper offers a comprehensive evaluation of the current state of cybersecurity in the context of smart healthcare, presenting a structured taxonomy of its existing cyber threats, mechanisms and essential roles. This study explored cybersecurity and smart healthcare systems (SHSs). It identified and discussed the most pressing cyber threats and attacks that SHSs face, including fake base stations, medjacking, and Sybil attacks. This study examined the security measures deployed to combat cyber threats and attacks in SHSs. These measures include cryptographic-based techniques, digital watermarking, digital steganography, and many others. Patient data protection, the prevention of data breaches, and the maintenance of SHS integrity and availability are some of the roles of cybersecurity in ensuring sustainable smart healthcare. The long-term viability of smart healthcare depends on the constant assessment of cyber risks that harm healthcare providers, patients, and professionals. This review aims to inform policymakers, healthcare practitioners, and technology stakeholders about the critical imperatives and best practices for fostering a secure and resilient smart healthcare ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, healthcare management, and sustainability research. Understanding the most recent cybersecurity measures is critical for controlling escalating cyber threats and attacks on SHSs and networks and encouraging intelligent healthcare delivery.Item Design a hybrid approach for the classification and recognition of traffic signs using machine learning(Wasit Journal of Computer and Mathematics Science, 2023-07) Ali, Guma; Sadıkoğlu, Emre; Abdelhak, HatimAdvanced Driver Assistance Systems (ADAS) are a fundamental part of various vehicles, and the automatic classification of traffic signs is a crucial component. A traffic image is classified based on its recognizable features. Traffic signs are designed with specific shapes and colours, along with text and symbols that are highly contrasted with their surroundings. This paper proposes a hybrid approach for classifying traffic signs by combining SIFT with SVM for training and classification. There are four phases to the proposed work: pre-processing, feature extraction, training, and classification. A real traffic sign image is used for classification in the proposed framework, and MATLAB is used to implement the frameworkItem Design and implementation of a DC to AC power electronics-based inverter that produces pure sine wave output for critical engineering applications(International Journal of Recent Technology and Applied Science, 2024-02-17) Mubeezi, Conceptar; Kalyankolo, Umaru; Eze, Val Hyginus Udoka; Okafor, Wisdom O.Power inverters play a crucial role in the field of engineering, particularly in applications where power stability is imperative. In devices such as Uninterruptible Power Supplies (UPS), the conversion of raw power to DC, subsequent filtering, and inversion to AC are executed through pure sine wave inverters. These inverters exhibit remarkable stability, making them ideal for powering sensitive equipment like data switches and Remote Terminal Units (RTUs). This study delves into the intricate process of converting DC power into a pristine sine wave signal. The heart of this power conversion lies in the utilization of the KA3525A integrated circuit (IC) in conjunction with MOSFETs of the PN55 series, supported by capacitors and resistors for effective power filtration. The KA3525A, a monolithic IC, encompasses all essential control circuits for a pulse width modulating regulator. Within this IC, a voltage reference, error amplifier, pulse width modulator, oscillator, under-voltage lockout, soft start circuit, and output driver collaborate seamlessly. The MOSFETs function as switches, synchronized with the oscillating signal from the KA3525A IC. This coordination, combined with the filter and other signal conditioning units, enables the conversion process. The design achieves the conversion of raw power into a stable pure sine wave signal of 170V AC at the H-bridge terminals, demonstrating the success of the designed approach.Item Design and implementation of a fire detection, alarm and suppression system using programmable logic controller (PLC)(International Journal of Academic Engineering Research (IJAER), 2023-12) Kalyankolo, Umaru; Drici, Joseph Felix TartisiousIndustrial and or domestic safety is as much important as the processes carried out in any industry/homes. This is because there is always a tendency for fires to occur due to the existence of fire hazards in industries, domestic and residential settings. Therefore, firefighting system is one of the most important systems in industries and in buildings with multiple occupancy as it protects the facilities, equipment and people against disastrous effects of fire breakouts. Fire detection, alarm and fighting system is a combination of number of devices working together to detect and warn the people through visual and audible appliances when smoke, heat and/or fire are present. It also triggers the suppression system. The alarm used in such system may be activated from flame or smoke detectors and heat detectors. In this project, smoke detectors have been used to detect fire and give an input signal to the programmable logic controller(PLC) which triggers the fire alarm and fire suppression system. Fire alarm system plays the main role in maintaining and monitoring the safety in all kinds of environments and situations. The main objective of this Fire Alarm Control System in Building Automation Using PLC is to make a fire control and suppression system with high reliability and low cost. The system has been designed to cover three zones of protection (three rooms) in which on detection of fire, zone 1 produces audible (buzzer) and visual light emitting diode(LED) alarm, while the LED, direct current (DC) water pump and a buzzer are triggered in zone 2 and a LED, buzzer and Solenoid valve are triggered for zone 3.Item Design and implementation of electronic voting system(International Journal of Computer & Organization Trends, 2017) Taban, Habibu; Konde, Sharif; Sebwato, NicholasThe Public opinion and democratic in universities setting are the most important determinant to establish a good administration. Voting is the process through which individuals convey their opinion and has the freedom to elect a leader of the choice to signify and address the student’s issues. In today’s technological and knowledge age, computerized related matters become widespread. E-voting is one of these substances and it is capable to deliver appropriate, less costly, fast and secure services. The aim of this paper is to present an electronic voting system (E-Voting) to be applied to Muni University student’s electoral body. Several security measures were integrated into the E-Voting system in order to achieve an enhanced, speedy and accurate performance. A computer software application was developed using PHP (Hypertext processor) programming language and MYSQL (My Structural Query Language), a relational database management system in designing the database; tested and found to have produced the expected results. It is about time that traditional voting in Muni University gives way to E-Voting and hence simplifies the task for Electoral commission and his/her Officials.Item Determining important parameters in Ebola epidemics(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2016) Arop, Martin Deosborns ; Luboobi, Livingstone; Nannyonga, BettyThe dynamics of Ebola can best be understood using a mathematical model that determines its dynamics in the community. The model designed in this study explicitly incorporates the latency period, the different transmission compartments, and immigration and emigration effects. The steady states of the system are analysed for existence of equilibria and their stability investigated. From qualitative analysis of the model, it is established that a disease-free equilibrium exists and is stable when ℛ0<1. When ℛ0>1, an endemic equilibrium state exists and is stable. Results show further that the model undergoes a hopf bifurcation at the endemic equilibrium and exhibits periodic oscillations. Sensitivity analysis shows that the most effective control measures are increasing hospitalization and reducing transmission rates. The numerical simulations performed demonstrated the theoretical results.Item The differences between single diode model and double diode models of a solar photovoltaic cells: systematic review(Journal of Engineering, Technology & Applied Science, 2023-08-21) Eze, Val Hyginus Udoka; Kalyankolo, Umaru; Edozie, Enerst; Nafuna, Ritah; Nansukusa, YudayaThis research paper systematically reviewed and investigated single diode model and double diode model of a solar photovoltaic systems in terms of accuracy, differences under major unknown PV parameters, different optimization and fabrication. This research paper reviewed the differences and the similarities between the single diode model and double diode model. From the review, it was clear that single diode model has less computation time and number of unknown parameters compared to double diode model. The double diode model on its own superiority is more accurate under solar shading condition effect than single diode model but single diode model performs better under high insolation levels. None of the two models is superior than the other but the solar photovoltaic modelers/installers should bear the solar irradiance of the environment before installation.Item The effect of human-computer interaction on new applications by exploring the use case of ChatGPT in healthcare services. In modern technology in healthcare and medical education: Blockchain, IoT, AR, and VR(IGI Global, 2024) Mijwil, Maad M.; Naji, Aseel Shakir; Doshi, Ruchi; Hiran, Kamal Kant; Bala, Indu; Ali, GumaHuman-Computer interaction (HCI) is a domain that focuses on growing the interaction between humans and computer systems by designing and developing user interfaces that are efficient and delightful to use. In this chapter, the authors focus on the importance of deep human-computer interaction on new applications with an emphasis on using ChatGPT applications in the health services domain. This chapter provides full details on the importance of executing ChatGPT in various health-related scenarios while highlighting the importance of HCI to enhance user interactions in personalized medical advice in a ChatGPT application. This chapter concludes that the capabilities of ChatGPT and artificial intelligence applications can revolutionize the healthcare industry by enhancing the accessibility and effectiveness of new media communications between the user and applications while creating innovative resolutions to improve healthcare services.Item Estimating urban heat island intensity using remote sensing techniques in Dhaka City(International Journal of Scientific & Engineering Research, 2017-04) Parvin, Nigar Sultana; Abudu, DanThis study assessed the effects of urban heat island in Dhaka city, Bangladesh from 2002 to 2014 using remote sensing techniques. Land cover changes were characterized over a twelve year period with keen interested on urban expansion and the resulting impacts created by these changes on the land surface temperatures investigated. The study also compared the land surface temperature and ground station temperature data to validate the surface temperature in Dhaka. Maximum likelihood supervised classification method was used for the land cover classification resulting in a classification accuracy of 86.5% and 90.7% for 2002 and 2014 respectively. Remarkable change in land cover was observed in built-up areas which increased by 21% of the total land area from 74.12 to 135.36 square kilomentres in 2002 and 2014 respectively. Combined end member selection and linear mixture model techniques were used to estimate the surface emissivity of the land surface properties. The obtained surface emissivity together with the brightness temperatures of the thermal bands were then used to calculate the land surface temperature. Results showed that land surface temperature increased throughout the study area. Temperature ranges of 28.5°C to 35.4°C were observed in 2002 and 37.9°C to 40.1°C in 2014. The difference between ground-based temperature and the satellite derived temperatures for the ground weather station were +1.8°C and +2.7°C in 2002 and 2014 respectively. This margin of difference is attributed to sensor calibration errors. The land surface temperature increased across all land cover types over the twelve year period indicating existence and potential effects of urban heat highland in the Dhaka city. The results indicates that there is urgent need for the city authority to implement measures that must monitor and contain the resulting effects on the city population and infrastructure.Item Evaluation of corrosion performance of LDX 2101 and UNS S32205 in flexible pipeline applications: A comparative study(Journal of Engineering Research and Reports, 2024-09-24) Gumoshabe, Michael; Opio, Innocent M.; Makanga, Jackson; Kule, Saimon; Ongom, DouglasLean duplex stainless steel (LDSS) has been used in various applications, including flexible pipelines in offshore and other industrial settings. In recent years, LDSS has become the preferred choice over standard duplex stainless steel (DSS) for flexible pipeline applications due to its lower costs, achieved by reducing nickel and molybdenum content, while still providing comparable corrosion resistance and mechanical strength properties to DSS. However, there is still limited reporting on the corrosion effects of reducing these alloys on the behaviour of lean duplex stainless steel in flexible pipelines. This comparative study investigates the corrosion resistance of lean duplex stainless steel, LDX 2101 and duplex stainless steel, UNS S32205 in flexible pipeline applications using linear polarization resistance (LPR). The research focuses on assessing material performance in environments containing CO2 and H2S, commonly found in oil and gas production, by conducting short-term and long-term tests to evaluate pitting and selective corrosion. The samples, LDX 2101 and UNS S32205 were immersed in a 3.5M NaCl solution, and corrosion measurements were performed using the Metrohm Autolab potentiostat. The results indicate that both materials exhibit good corrosion resistance, but there are differences in their performance under specific conditions. While lean duplex stainless steel, LDX 2101, can be used as a substitute for duplex stainless steel UNS S32205, its corrosion resistance and mechanical properties gradually decrease over time due to the reduced nickel and molybdenum content. As a result, it would not be as effective as duplex stainless steel UNS S32205 in withstanding corrosion in aggressive conditions over a prolonged period.
- «
- 1 (current)
- 2
- 3
- »