A theoretical study on corrosion inhibitors was done by quantum calculations includes semi-empirical PM3 and Density Functional Theory (DFT) methods based on B3LYP/6311++G (2d,2P). Benzimidazole derivative (oxo(4- ((phenylcarbamothioyl) carbamoyl)phenyl) ammonio) oxonium (4NBP) and thiourea derivative 2-((4- bromobenzyl)thio) -1H-benzo[d] imidazole (2SB) were used as corrosion inhibitors and an essential quantum chemical parameters correlated with inhibition efficiency, EHOMO (highest occupied molecular orbital energy) and ELUMO (lowest molecular orbital energy). Other parameters are also studied like energy gap [ΔE (HOMO-LUMO)], electron affinity (EA), hardness (Δ), dipole moment (μ), softness (S), ionization potential (IE), absolute electron negativity (χ), and global electrophilicity index (ω) respectively. Mulliken population was also essential to determine a local reactivity by indicating reactive centers and identifyinga potential nucleophilic and electrophilic attacks sites. The adsorption of compounds is also discussedwith the bonds length, the angles, and tetrahedral of molecules. The 2SB best from 4NBP as corrosion inhibitors according to theoretical and experimental proving.Predicated.
A good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show MoreNew compounds containing heterocyclic units have been synthesized. These compounds include 2-amino 5- phenyl-1,3,4-thiadiazole (1) as starting material to prepare the Schiff bases 2N[3-nitrobenzylidene -2 hydroxy benzylidene and 4-N,N-dimethyl aminobenzylidene] -5-phenyl-1,3,4-thiadiazole (2abc) , 2N[3-nitrophenyl, 2-hydroxyphenyl or 4-N,N-dimethylaminophenyl] 3-]2-amino-5-phenyl-1,3,4-thiadiazole]-2,3-dihydro-[1,3]oxazepine-benzo-4,7-dione] (3abc), 2N[3-nitrophenyl,2-hydroxyphenyl,4-N,N-dimethylaminophenyl]-3-[2-amino-5-phenyl-1,3,4-thiadiazole-2-yl]-2,3-dihydro-[1,3]oxazepine-4,7-dione[(4abc), 2-N-[3-nitrophenyl, 2-hydroxyphenyl or 4-N,N-dimethylaminophenyl]-3-[2-amino-5-phenyl-1,3,4-thiadiazole-2yl]-1,2,3-trihydro-benzo-[1,2-e][1,3] diaz
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreLike the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
New sulfonamide derivatives comprising azide, 1, 2, 3- triazole, azo , chalcone and Schiff base moieties had synthesized. The structures of the new compunds have been confirmed byFT-IR and ¹H-NMR spectra. The synthesized derivatives have been screened for antimicrobial and in vitro antioxidant properties. The results of this investigation revealed that the newly synthesized compounds have good antimicrobialand antioxidant activities.
Let be a commutative ring with identity. The aim of this paper is introduce the notion of a pseudo primary-2-absorbing submodule as generalization of 2-absorbing submodule and a pseudo-2-absorbing submodules. A proper submodule of an -module is called pseudo primary-2-absorbing if whenever , for , , implies that either or or . Many basic properties, examples and characterizations of these concepts are given. Furthermore, characterizations of pseudo primary-2-absorbing submodules in some classes of modules are introduced. Moreover, the behavior of a pseudo primary-2-absorbing submodul
... Show MoreThe research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More