A theoretical study on corrosion inhibitors was done by quantum calculations includes semi-empirical PM3 and Density Functional Theory (DFT) methods based on B3LYP/6311++G (2d,2P). Benzimidazole derivative (oxo(4- ((phenylcarbamothioyl) carbamoyl)phenyl) ammonio) oxonium (4NBP) and thiourea derivative 2-((4- bromobenzyl)thio) -1H-benzo[d] imidazole (2SB) were used as corrosion inhibitors and an essential quantum chemical parameters correlated with inhibition efficiency, EHOMO (highest occupied molecular orbital energy) and ELUMO (lowest molecular orbital energy). Other parameters are also studied like energy gap [ΔE (HOMO-LUMO)], electron affinity (EA), hardness (Δ), dipole moment (μ), softness (S), ionization potential (IE), absolute electron negativity (χ), and global electrophilicity index (ω) respectively. Mulliken population was also essential to determine a local reactivity by indicating reactive centers and identifyinga potential nucleophilic and electrophilic attacks sites. The adsorption of compounds is also discussedwith the bonds length, the angles, and tetrahedral of molecules. The 2SB best from 4NBP as corrosion inhibitors according to theoretical and experimental proving.Predicated.
In this paper, the proposes secure system to improving security of ID card and passports is by generating cubic spline co-occurrence code (CCO code) for each ID card. The authentication part, begins passing ID card through the checkpoint then the checkpoint will check the information of card or passport by also extracting features in order to generate the cubic spline co-occurrence code (CCO code), finally comparison is made between extracted CCO code at the checkpoint and CCO code that has been printed on ID card or passport (type of fraud like change personal picture or fraud it’s information). Several tests were conducted to evaluate the performance of the proposed security system. Furthermore, the experiment results reveal that the
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreIn this research, we will discuss how to improve the work by dealing with the factors that
participates in enhancing small IT organization to produce the software using the suitable
development process supported by experimental theories to achieve the goals. Starting from
the selecting of the methodology to implement the software. The steps used are and should be
compatible with the type of the products the organization will produce and here it is the Web-Based Project Development.
The researcher suggest Extreme Programming (XP) as a methodology for the Web-Based
Project Development and justifying this suggestion and that will guide to know how the
methodology is very important and effective in the software dev
The study was aimed to isolate and identify endophytic fungi from myrtle (Mrtus communis) leaves and study their extracellular enzymes activity. Results revealed isolation of 99 species or ioslated of endophytic fungi obtained from 500 leaves fragment, which represented colonization frequency (CF) of 20.4%. Those fungi were related to 23 species or isolates, Aspergilli were dominated over all species (11 species) with CF 14%. Moreover A. niger and A. flavus showed the higtest CF values over all. Other isolated fungi were related to the genera: Penicillium spp., Cladosporium sp., Cunninghamella sp., Derchslera sp., Alternaria sp. Paecilomyces sp. and sterile fungi (mycelia sterilia). Extracelluar enzymes activity showed varation in
... Show MoreThe primary aim of this paper is to present two various standpoints to define generalized membership relations, and state the implication between them, in order to categorize the digraphs and assist for their gauge exactness and roughness. In addition, we define several kinds of fuzzy digraphs.
A new series of morpholine derivative were prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as an catalyst and benzene as a solvent gave the ethyl morpholin-4-ylacetate reaction with hydrazine hydrate and ethanol as a solvent gave the 2-(morpholin-4-yl)acetohydrazide gave series of Schiff base were prepared by reacting 2-(morpholin-4- yl)acetohydrazide with different aromatic aldehydes and ketons . The new series of (3-9 )were synthesis by reaction of Schiff base (10-14) with chloroacetyl chloride, triethyl amine as an catalyst and 1,4dioxane as a solvent .The chemical structures of the synthesis compound were identified by spectral methods their [ IR ,1H-NMR and 13C-NMR ].The synthesised compoun
... Show MoreHuman cytomegalovirus (HCMV) has a worldwide distribution and extremely common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers especially breast cancer. In Iraq, the incidence of breast cancer generally exceeds any other type of malignancies among Iraqi population. The study was performed in the period between October 2016 and June 2017 in Central public health laboratory/Baghdad. It involve samples from 90 women including 60 breast cancer patients, 20 benign tumor patients, and 10 normal breast tissues. A blood sample was obtained from each woman included in this study. Anti-HCMV IgG antibody was presented in 9/10 (90%) of normal women, benign breast tumor patients 19/20 (95%) and malig
... Show MoreAlthough the term' tautology' predicts negative connotation, it is often employed by poets and lyric writers to communicate more implied meanings. Through the use of tautological expressions, they exchange ideas, give more possibilities to readers to detect the meaning behind the tautological words and thus suggest details not openly communicated in the poem. Ten American song lyrics and ten American poems have been selected to be the data for the study. Data analysis is conducted on the basis of three steps:(i) identifying the type of tautology used ,(ii) detecting the syntactic realization of the tautology and (iii) finding the functions of the use of tautology in these lyrics and poems. The study concludes that song lyrics and p
... Show MoreTwo isolates of Staphylococcus xylosus (urease producer and non urease producer) were injected in mice at a dose of 2 × 108 colony-forming units (CFU) intraurethrally. Results showed that both isolates were able to colonize kidney and bladder of the injected mice, regardless of their urease production. Moreover, there were insignificant differences between the two groups. These results emphasized the pathogenicity of this bacteria in UTI.
It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show More