This research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was studied by cathode and anode polarization through which all corrosion parameters were investigated which include: corrosion current icorr (1341× 10-7- 5393 × 10-9A/cm2), corrosion potential Ecorr (-1.031- -0.227 mV vs SCE) , corrosion rates CR (0.658-0.007 mm.y-1), inhibition efficiency %IE (92-98%), and energy activation barriers Ea (4.709-26.733 kJ/mole). The thermodynamic and kinetic properties of the corrosion behavior of these two metals under study, which include: enthalpy ∆H*(2.153-24.176 kJ/mole), entropy ∆S*(-197 -156 J/mole), and free Gibbs energy ∆G*(59.87-74.56 kJ/mole) before and after using the inhibitor, were also studied.
The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show MoreThis paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, satura
... Show Moreبعد الانحرافات التي شابت تنفيذ المسؤولية عن الحماية في ليبيا عام 2011، دعت البرازيل الى اتباع التسلسل في تنفيذ الركائز الثلاث للمسؤولية عن الحماية عند معالجة الازمات الانسانية ذات الصلة بجرائم الحرب والجرائم ضد الانسانية وجريمة الابادة الجماعية وجريمة التطهير العرقي، في حين دعا الامين العام للامم المتحدة في العديد من تقاريره السنوية بشأن المسؤولية عن الحماية بانه لاينبغي التقيد بالتسلسل واعتبر ان الركائز ا
... Show MoreTrimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used.
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
This research studied the effect of magnetized water in concrete preparation and its effect on the presenting of cement in concrete mixtures also to find the ability of reducing the amount of cement in preparing one cubic meter, this is not exceed than 10% in one mixture , The experiments showed the preparation of standard cubes from the concrete which was used two kind of water magnetized water which was prepared by passing the tap water through the systems of different magnetic strength in terms of (6000,9000) Gauss and the ordinary water . The velocity of water through the magnetic field, which gives us the highest value for the compressive strength, was up to 1m/sec. to determine the best magnetic intensity, we examined The comp
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show More