A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiometric polarization measurements. The results revealed that the (%IE) for carbon steel corrosion by ADNQ2O is (89.88%). The obtained thermodynamic parameters support the physical adsorption mechanism. The adsorption followed the Langmuir isotherm. The surface change on carbon steel was studied using SEM (Scanning Electron Microscopy)
The manganese doped zinc sulfide nanoparticles were synthesized by simple aqueous chemical reaction of manganese chloride, zinc acetate and thioacitamide in aqueous solution. Thioglycolic acid is used as capping agent for controlling the nanoparticle size. The main advantage of the ZnS:Mn nanoparticles of diameter ~ 2.73 nm is that the sample is prepared by using non-toxic precursors in a cost effective and eco-friendly way. The structural, morphological and chemical composition of the nanoparticles have been investigated by X-ray diffraction (XRD), Scanning Electron Microscopy (SEM) with energy dispersion spectroscopy (EDS) and Fourier transform infrared (FTIR) spectroscopy. The nanosize of the prepared nanoparticles was elucidated by Scan
... Show MoreAutorías: Nuha Mohsin Dhahi, Ahmed Thare Hani, Muwafaq Obayes Khudhair. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.
Complexes of Co(II),Ni(II),Cu(II)and Zn(II) with mixed ligand of 4 tributylphosphine (PBu3) were prepared in aqueous ethanol with (1:2:2) (M:L:PBu3)The prepared
In this study the Sub family of Nomiinae Robertson,1904 (Hyminoptera: Halictidae) was revised There were five species registered in our investigation:
The present study aims to explore determinants of entrepreneurial behavior from perspective of social theory. It is based on model notions of (Tyler & Blader, 2003) which have focused on studying role of positively personal and social identity in motivating employees to practicing desired behavior which serves the organization in which they work. Based on these notions and previous literature, study model were built. This model explains the relationship between status judgments (perceived internal respect and perceived external prestige) and entrepreneurial behavior. It includes three main hypotheses. The first and second hypothesis are concerning the relationship between status judgmen
... Show MoreABSTRACT
Critical buckling temperature of angle-ply laminated plate is developed using a higher-order displacement field. This displacement field used by Mantari et al based on a constant ‘‘m’’, which is determined to give results closest to the three dimensions elasticity (3-D) theory. Equations of motion based on higher-order theory angle ply plates are derived through Hamilton, s principle, and solved using Navier-type solution to obtain critical buckling temperature for simply supported laminated plates. Changing (α2/ α1) ratios, number of layers, aspect ratios, E1/E2 ratios for thick and thin plates and their effect on thermal
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More
