This work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreThe soap content in biodiesel is an important challenge during the production and purification processing of biodiesel. Natural deep eutectic solvents (NADES) have recently attracted considerable interest as an environmentally suitable substitute for traditional solvents in the biodiesel industry. This work investigates the soap removal from the contaminated biodiesel using NADES. Eight choline chloride‐based deep eutectic solvents (DESs) were screened using the conductor‐like screening model for real solvents (COSMO‐RS) to identify the most suitable solvent for soap removal and were validated experimentally. The effect of NADES molar ratio, NADES:biodiesel ratio, mixing speed and extraction ti
Unused and expired pharmaceutical drugs are a novel type of organic corrosion inhibitor. They are less expensive, more effective, and less harmful than conventional organic corrosion inhibitors. This study investigated the effects of concentration, adsorption mechanism and thermodynamic parameters of enalapril malate (ENAP) as a corrosion inhibitor for carbon steel in a saline solution (3.5 % NaCl). The polarization method was used to determine the corrosion rate and inhibition efficiency. Field emission scanning electron microscopy (FE-SEM) and atomic force spectroscopy (AFM) were used to investigate the surface morphology and topography of carbon steel after immersion in both uninhibited and inhibited media for 24 h. Fourier transform inf
... Show MoreВ статье рассматриваются понятие наглядности и ее классификация, эффективное применение принципа наглядности, возможность и преимущество использования наглядности и современные инструменты ее реализации в ираке.
Вследствие глобальных изменений во всем мире изменилась и роль иностранного языка в системе образования. Современный человек, шагающий в ногу со временем, не мыслит себя без зна
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More