Preferred Language
Articles
/
0BZ344cBVTCNdQwCdGoF
Study the application of new type green corrosion inhibitors for iron metal
...Show More Authors

Density functional theory (DFT) calculations were used to evaluate the capability of Glutamine (Gln) and its derivative chemicals as inhibitors for the anti-corrosive behavior of iron. The current work is devoted to scrutinizing reactivity descriptors (both local and global) of Gln, two states of neutral and protonated. Also, the change of Gln upon the incorporation into dipeptides was investigated. Since the number of reaction centers has increased, an enhancement in dipeptides’ inhibitory effect was observed. Thus, the adsorption of small-scale peptides and glutamine amino acids on Fe surfaces (1 1 1) was performed, and characteristics such as adsorption energies and the configuration with the highest stability and lowest energy were calculated. Based on previous researches, it is understood that the adsorption of dipeptides on the aforementioned moieties has a chemical nature. The protonation of configuration leads to an increase in the amount of energy of adsorption on the surface of metal among the inhibitors. Theoretically speaking, it is more likely for peptides to adsorb on the surface of iron, and this fact reveals that these moieties are highly effective in terms of inhibitive applications. According to the obtained findings, small peptides can be used as favorable “green” corrosion inhibitors.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2024
Journal Name
Intelligent Automation And Soft Computing
Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm
...Show More Authors

Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Thompson –Type Testimators for the Parameters of Simple Linear Regression Model
...Show More Authors

 Dens itiad ns vcovadoay fnre Dec2isco0D,ia asrn2trcds4 fenve ns 6ocfo ts ida%n2notd, rasr sedno6t(a asrn2trcd fnre sc2a 2cynwnvtrnco co nrs wcd2 /nt sedno6t(a fan(er wtvrcd ﯿ)ﺔ mh         Dens r,ia cw asrn2trcds et/a laao vcosnyaday wcd asrn2trno( rea itdt2arads ﻘ cw sn2i%a %noatd da(dassnco 2cya%4 feao t idncd asrn2tra cw rea itdt2arad /t%ua )ﻘm ns t/tn%tl%a4 st, ﻘxh Dens ﻘx ets laao dawadday no srtrnsrnvt% %nradtrudas ts (uass icnor tlcur rea itdt2arad ﻘh         Dea aMidassncos wcd Snts4 Oato -9utday 8ddcd )O-8m toy .a%trn/a 8wwnvnaov, cw rea idcicsay asrn2trcds tda clrtnoayh 1u2adnvt% dasu%rs tda idc/nyay feao rea

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization Of New Schiff Base And Some Metal Complexes Derived From Glyoxylic Acid And O-Phenylenediamine
...Show More Authors

The new Schiff base, namely (2-Amino-phenylimino)-acetic acid (L) was prepared
from condensation of glyoxylic acid with o-phenylene diamine. The structure (L) was
characterized by, IR,
1
H,
13
C-NMR and CHN analysis. Metal complexes of the ligand (L)
were synthesized and their structures were characterized by Atomic absorption, IR and UV-Visible spectra, molar conductivity, magnetic moment and molar ratio determination (Co
+2
,
Cd
+2
) complexes. All complexes showed octahedral geometries.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Designing and Application of Mathematical Model A Multi – Objectives for Assessment The Quality Of The Project : A Case Study at Saad Public Construction Company
...Show More Authors

Abstract

This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 09 2025
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Fri Sep 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization and Studying the Enzyme Activity of New Benzothiazole Schiff Base Ligand (HL) and Its Complexes with Some of Metal Ions
...Show More Authors