Preferred Language
Articles
/
bsj-7637
Corrosion Inhibition Efficiency Investigation of Yttrium Oxide Nanoparticles Coated on Carbon Steel Alloy
...Show More Authors

Metal oxide nanoparticles demonstrate uniqueness in various technical applications due to their suitable physiochemical properties. In particular, yttrium oxide nanoparticle(Y2O3NPs) is familiar for technical applications because of its higher dielectric constant and thermal stability. It is widely used as a host material for a variety of rare-earth dopants, biological imaging, and photodynamic therapies. In this investigation, yttrium oxide nanoparticles (Y2O3NPs) was used as an ecofriendly corrosion inhibitor through the use of scanning electron microscopy (SEM), Fourier transforms infrared spectroscopy (FT-IR), UV-Visible spectroscopy, X-ray diffraction (XRD), and energy dispersive X-ray spectroscopy(EDX), the physico-chemical characterization of Y2O3NPs was examined. The primary characteristic peak of YOY at 565 cm-1, which indicates the synthesis of nanoparticles, is seen in the FT-IR spectra. The XRD pattern showed that a single phase cubic structure of YONPs with an Ia-3 space group had formed. SEM was used to examine the surface morphology. The composition of Yttrium and oxygen in Y2O3NPs was determined to be 78.74% and 21.26%, respectively, according to the EDX results. The anticorrosive behavior was tested by polarization curve in 18.204% CaCl2 solution at five temperatures in the range 293- 313 K. Various concentrations 0.15 0.26 and 0.37 of N Y2O3NPs coating on the carbon steel surface were applied using the electrophoresis deposition method. The obtained results indicated that Y2O3NPs formed a protective film acts as a physical barrier for the protection of steel alloy. Additionally, corrosion protection efficiency values of 0.26 N Y2O3NPs coating were superior to that of 0.15 and 0.37 N Y2O3NPs coating, respectively.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
On Monotonically T2-spaces and Monotonicallynormal spaces
...Show More Authors

In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On Tˉ-pure sub-acts over moniods
...Show More Authors

The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Apr 25 2014
Journal Name
Journal Of Kufa For Nursing Science
Environmental Effects On Women's With Spontaneous Abortion
...Show More Authors

Background: spontaneous abortion constitutes one of the most important adverse pregnancy outcomes affecting human reproduction, and its risk factors are not only affected by biological, demographic factors such as age, gravidity, and previous history of miscarriage,but also by individual women’s personal social characteristics, and by the larger social environment. Objective:To identifyEnvironmental effects on Women's with Spontaneous Abortion. Methodology:Non-probability(purposive sample)of(200) women, who were suffering from spontaneous abortion in maternity unitfrom four hospitals at Baghdad City which include Al-ElwiaMaternity Teaching Hospital, and Baghdad Teaching Hospital at Al-Russafa sector. Al–karckhMaternityHospita

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Wed Mar 11 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Sharia's position on historical statues and monuments
...Show More Authors

A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electro-less Copper Deposition on ABS Plastic
...Show More Authors

CuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.

View Publication Preview PDF