This research involves the synthesis of some sulphanyl benzimidazole derivatives (Ia-c), which were prepared from reaction of 2-mercaptobenzimidazole substituted benzyl halide, and structures were identified by spectral methods[FTIR, 1H-NMR and 13C-NMR].These compounds were investigated as corrosion inhibitors for carbon steel in 1M H2SO4 solution using weight loss, potentiostatic polarization methods; obtained results showed that the sulphanyl benzimidazole derivatives retard both cathodic and anodic reactions in acidic media, by virtue of adsorption on the carbon steel surface. This adsorption obeyed Langmuir’s adsorption isotherm. The inhibition efficiency of (Ia-c) ranging between (65-92) %. By using different Ib derivative concentration and temperature, the carbon steel corrosion rate was decreased with increasing Ib concentration and the highest inhibition efficiency reach to 92.8% by using 4.6×10-4 M Ib concentration at 308 K,the inhibition efficiency increases with increasing temperature ranging(308-338)K.
Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreThe current research aims at extracting the standard characteristics of the emotional balance of the university students according to the response theory. This was accomplished by following accredited scientific steps, to achieve this goal, the researcher followed scientific steps in the procedures of the analysis of the scale. She translated the scale from English to Arabic and then made a reverse translation. it was presented to a committee of experts in English to ensure and verify the validity of the paragraphs logically and prove the face validity of the scale, which consists of (30) paragraphs, it was presented to (6) experts who are specialists in the educational and psychological sciences and in the light of their observations ha
... Show MoreIn order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Eco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreThe research aims at clarifying the relationship between innovative marketing skills and broad recommendation as a vital and important issue for organizations in general and service organizations in particular to demonstrate how innovative marketing skills contribute to broad adoption and to determine the relationship between interdependence and the impact of innovative marketing skills on the broad recommendation. Some questions are posed by the research problem. Is there a clear awareness among individuals in the company about the concept of marketing marketing skills and how do innovative marketing skills affect the broad recommendation of the surveyed company? How innovative marketing skills relate to the broad recommendation
... Show MoreThis paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.
This study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More