A new benzylidene derivative, namely N-benzylidene-5-phenyl-1,3,4-thiadiazol-2-amine (BPTA), has been synthesized and instrumentally confirmed with Elemental Analysis (CHN), Nuclear Magnetic Resonance (NMR), and Fourier Transform Infrared Spectroscopy (FT-IR). Titanium Dioxide (TiO2) nanoparticles (NPs) were synthesized and characterized by X-ray. The mutualistic complementary dependence of BPTA with TiO2 nanoparticles as anti-corrosive inhibitor on mild steel (MS) in 1.0 M hydrochloric acid has been tested at various concentrations and various temperatures. The methodological work was achieved by gravimetric measurement methods complemented with surface analysis. The synthesized inhibitor concentrations were 0.1 mM to 0.5 mM and the temperatures ranging from 303–333 K. The BPTA with TiO2-NP as a synergistic inhibitor becomes superior inhibitive effects with more than 96% inhibition competence of MS coupons in a harsh acidic medium. The efficiency of the inhibition improved with increasing BPTA content and also increase with the Synergistic effects of BPTA with TiO2-NP. The excellent effectiveness was performed with the 0.5 mM concentration of BPTA and become higher with adding of TiO2-NP rising to the maximum inhibition efficiency (IE). However, the inhibition efficacy declined as the temperature rises. Results of BPTA as corrosion inhibitor indicated the obedience of the adsorption of the inhibitor of mixed type on the surface of MS to Langmuir adsorption isotherm. It was found that the BPTA and performance depend on the Synergistic effects, concentrations of the TiO2-NP and BPTA, in addition to the solution temperature. Nevertheless, the quantum calculations have confirmed the direct correlation of the electronic characteristics of BPTA with the corrosive inhibitive influence.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreCitric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show MoreAbstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an
... Show MoreThe current research studies the innovative thinking system in the field of the interior design, and the extent of the possibility of activating its work mechanisms as a strategy for the redesigning principle according the variables of the contemporary social thinking. The research aims at revealing the nature of the thinking criteria and requirements that provide strategic values that guide the interior designer and the architect to organize the mechanism the act of designing. It also contributes in dealing with the design product through activating its ability in innovation and redesigning.
The research consists of the concept of innovation, the&nbs
... Show More