A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiometric polarization measurements. The results revealed that the (%IE) for carbon steel corrosion by ADNQ2O is (89.88%). The obtained thermodynamic parameters support the physical adsorption mechanism. The adsorption followed the Langmuir isotherm. The surface change on carbon steel was studied using SEM (Scanning Electron Microscopy)
This work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show MoreThe study aims to identify the effect of training with weight added to different parts of the body in improving the biomechanical variables of the last step and upgrading the high jump for young people, the research was applied to one of the elite high jumpers for young people, and video imaging and kinetic analysis were conducted to extract the variables under study, and then the jumper underwent For the proposed exercises by 3 training units per week for a period of (8) weeks, in which emphasis was placed on improving the rotational forces (moments) of these parts, and then the post-tests were conducted, and the researcher concluded that the exercises applied and the added weights for all parts of the body (leg, thigh, trunk, and arms) le
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreThe aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show More