Preferred Language
Articles
/
bsj-7256
Corrosion Inhibition of Medium Carbon Steel in the Acidic Medium Using Alcoholic and Aqueous Extract of Kujarat Tea Plant
...Show More Authors

This study deals with the corrosion inhibition of metal corrosion process of medium carbon steel using 1M HCl for kinetic studies and rate reaction determination. The weight loss method is applied to pieces of Medium carbon steel divided to Cubans with dimensions (0.4*2*2.4) cm , and use Tafel Extrapolation Method, the samples were polished using carbide silicon paper with dimensions of (180,200,400,600,800,1000). The samples were immersed in the alcoholic medium ethanol at a temperature 293K for 3hr. Natural inhibitor Kujarat Tea (Hibiscus sabdarriffa L.) is used which is extracted in aqueous and alcoholic medium, different concentrations (1000،2000, 3000) ppm have been used ; The best concentration found through the results is a concentration found that is 1000 and 2000 ppm, the results indicate that the highest degree of inhibition for aqueous extract is 93.3% with the concentration of 2000 ppm and 90.5% with 1000 ppm at293K. While the alcoholic inhibitor shows the highest efficiency 92.4% with a concentration of 2000 ppm and 88.6% with a concentration of 1000 ppm respectively. The structure of the inhibitor was investigated using infrared spectroscopy (FTIR), and the surface morphology of the tested samples was investigated using a scanning electron microscope (SEM).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Apr 09 2013
Journal Name
International Journal Of Biological & Pharmaceutical Research
Antibiofilm, antibacterial and antioxidant activities of water extract of Calendula officinalis flowers
...Show More Authors

ABSTRACT The antibacterial and antbiofilm activities of water extract of Calendula officinalis flowers against some of enteropathogenic bacteria was studied, also phytochemical screening and determination of antioxidant activity of the extract has been investigated. The results showed that the water extract of C. officinalis exhibited a good antibacterial activity against all pathogenic bacterial isolates (Salmonella, Shigella dysenteriae, Shigella flexneri, Shigella sonnei and E. coli) especially at concentration 100 µg/ml in contrast with the control cefotan antibiotic. S. sonnei was more sensitive to extract than other bacteria with highest inhibition zone (23 mm). The preliminary phytochemical tests results indicated the presence

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Mechanical Properties of Burnished Steel AISI 1008
...Show More Authors

Burnishing improves fatigue strength, surface hardness and decrease surface roughness of metal because this process transforms tensile residual stresses into compressive residual stresses. Roller burnishing tool is used in the present work on low carbon steel (AISI 1008) specimens. In this work, different experiments were used to study the influence of feed parameter and speed parameter in burnishing process on fatigue strength, surface roughness and surface hardness of low carbon steel (AISI 1008) specimens. The first parameter used is feed values which were (0.6, 0.8, and 1) mm at constant speed (370) rpm, while the second parameter used is speed at values (540, 800 and 1200) rpm and at constant feed (1) mm. The results of the fatigue

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 27 2024
Journal Name
The Iraqi Journal Of Veterinary Medicine
Evaluating the Hepatoprotective Potential of Ginger Ethanolic Extract Against Lambda-Cyhalothrin-Induced Toxicity in Male Rats
...Show More Authors

Ginger (Zingiber officinale Rosc.) is a traditional plant that is widely used as a spice or folk medicine. Lambda-cyhalothrin (LCT) is a synthetic pyrethroid that is widely used to control insecticide. The present study aimed to evaluate the potential protective effect of ginger ethanolic extract (GEE) on liver toxicity experimentally induced by LCT in albino rats. The experiment involved thirty adult male rats (‎Rattus norvegicus)‎, randomly ‎allocated to ‎one of three groups (n=10/group: control group, administered distilled water orally for 12 weeks‎; ‎LCT-treated group, received 5.43 mg/kg BW ‎(1/15 LD50‎ dose calculated in this study as 81.5 mg/kg BW) orally, for 12 weeks;‎ LCT-‎GEE-treated group, received t

... Show More
View Publication
Crossref
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of Anabasis articulata Stems Extract on Lowering Intraocular Pressure in the Glaucoma Rat Model(Conference Paper )#
...Show More Authors

High intraocular pressure (IOP) is a recognized risk factor for glaucoma and optic nerve injury, and it is one of the primary causes of vision loss globally. Anabasis articulata (AA) is a desert plant found in Iraq. The extract of AA is used to cure diabetes, fever, eczema, and kidney infections. The aim of the study is to evaluate the antioxidant effect of methanol extract of AA on intraocular pressure in the glaucoma rat model. Forty-two rats were allocated into seven groups, each with six animals:: group 1 (normal), group 2 (control), in which animals were induced to have elevated IOP by betamethasone suspension injection, groups 3,4 and 5 for evaluating the effect of 50,100 and 150 mg/kg/day of the tested extract, respective

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Designing Primers with a Plant Signal Peptide to Enhance the Expression of GBA1 in Transgenic Soybean Plants
...Show More Authors

Transgenic plants offer advantages for the manufacture of recombinant proteins with terminal
mannose residues on their glycan chains. So plants are chosen as source of pharmaceutical products and for
the development of alternative expression systems to produce recombinant lysosomal enzymes. In the
present study the sequence of the natural cDNA encoding for the human lysosomal enzyme
glucocerebrosidase (GCD) was modified to enhance its expression in soybean plants. The glucocerebrosidase
gene signal peptide was substituted with that signal peptide for the Arabidopsis thaliana basic endochitinase
gene to support the co-translational translocation into the endoplasmic reticulum (ER), and the storage
vacuol

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref