Preferred Language
Articles
/
4BbLXYcBVTCNdQwC00fT
HOMO-LUMO Energies and Geometrical Structures Effecton Corrosion Inhibition for Organic Compounds Predict by DFT and PM3 Methods
...Show More Authors

A theoretical study on corrosion inhibitors was done by quantum calculations includes semi-empirical PM3 and Density Functional Theory (DFT) methods based on B3LYP/6311++G (2d,2P). Benzimidazole derivative (oxo(4- ((phenylcarbamothioyl) carbamoyl)phenyl) ammonio) oxonium (4NBP) and thiourea derivative 2-((4- bromobenzyl)thio) -1H-benzo[d] imidazole (2SB) were used as corrosion inhibitors and an essential quantum chemical parameters correlated with inhibition efficiency, EHOMO (highest occupied molecular orbital energy) and ELUMO (lowest molecular orbital energy). Other parameters are also studied like energy gap [ΔE (HOMO-LUMO)], electron affinity (EA), hardness (Δ), dipole moment (μ), softness (S), ionization potential (IE), absolute electron negativity (χ), and global electrophilicity index (ω) respectively. Mulliken population was also essential to determine a local reactivity by indicating reactive centers and identifyinga potential nucleophilic and electrophilic attacks sites. The adsorption of compounds is also discussedwith the bonds length, the angles, and tetrahedral of molecules. The 2SB best from 4NBP as corrosion inhibitors according to theoretical and experimental proving.Predicated.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
Approximately Regular Rings and Approximately Regular Modules
...Show More Authors

Abstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.

Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
The Satellite Images Matching and Mosaic Techniques
...Show More Authors

      The Matching and Mosaic of the satellite imagery play an essential role in many remote sensing and image processing projects. These techniques must be required in a particular step in the project, such as remotely change detection applications and the study of large regions of interest. The matching and mosaic methods depend on many image parameters such as pixel values in the two or more images, projection system associated with the header files, and spatial resolutions, where many of these methods construct the matching and mosaic manually. In this research, georeference techniques were used to overcome the image matching task in semi automotive method. The decision about the quality of the technique can be considered i

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (5)
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Forgotten Index and Forgotten Coindex of Graphs
...Show More Authors

F index is a connected graph, sum of the cubes of the vertex degrees. The forgotten topological index has been designed to be employed in the examination of drug molecular structures, which is extremely useful for pharmaceutical and medical experts in understanding the biological activities. Among all the topological indices, the forgotten index is based on degree connectivity on bonds. This paper characterized the forgotten index of union of graphs, join graphs, limits on trees and its complements, and accuracy is measured. Co-index values are analyzed for the various molecular structure of chemical compounds

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Sharia's position on historical statues and monuments
...Show More Authors

A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 14 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Noise effects in skill discretion and modeling
...Show More Authors

Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo

... Show More
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Becoming and integrative film in postmodern cinema
...Show More Authors

The subject of the tagged research (becoming and integration of the film in postmodern cinema) is summarized by studying the transformations and complementarity of the film in light of the emergence of the concern of postmodernism. Then the need for it, as well as the objectives of the research and clarify its limits, as well as its importance. Then the transition to the theoretical framework, which included two sections, the first topic was entitled: Postmodern Cinema Formation and Completion, while the second topic was entitled: Paradox in Postmodern Film.

After completing the theoretical aspect, the research concluded with a number of theoretical framework indicators that were adopted as a tool for analyzing the sample, then th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Internet Addiction: Healthy, Psychological, and Social Implications
...Show More Authors

The aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 18 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Glomerulogenesis and Histomorphometeric in Mus musculus Embryo
...Show More Authors

In mammals, the kidneys originate in an embryo from the mesoderm through three excretory organs, namely: Pronephros, Mesonephros, and Metanephros. After the formation of Metanephros is completed, the kidneys begin to form nephrogenesis through mesenchymal cells located at the tip of the ureteric bud, that contribute in the formation of glomerulus and Renal tubules. The stages of glomerulus formation in the embryo of albino mice at the age of 14 to 19 days of gestation were studied. It was obtained after the sacrifice of the expectant mother and the kidneys were excised from the embryos and fixed using Aqueous Bouin's solution, Microscopic slices with a thick

... Show More
View Publication
Crossref