Preferred Language
Articles
/
KoYXYYYBIXToZYALoYnd
Cathodic protection system of copper–zinc–saline water in presence of bacteria
...Show More Authors

Rate of zinc consumption during the cathodic protection of copper pipeline which carries saline water was measured by weight loss technique in the absence and presence of bacteria. Variables studied were solution flow rate, temperature, time and NaCl concentration. It was found that within the present range of variables; the rate of zinc consumption increases with the increase of all operating conditions. The presence of bacteria increases the zinc consumption. Fourth order multi-term model and one-term model were suggested to represent the consumption data. Nonlinear regression analysis was used to estimate the coefficients of these models, while statistical analysis was used to determine the effect of each coefficient. Both models were representing the data successfully.

Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors

Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluation the Effect of Velocity and Temperature on the Corrosion Rate of Crude Oil Pipeline in the Presence of CO2/H2S Dissolved Gases
...Show More Authors

In this paper investigate the influences of dissolved CO2/H2S gases, crude oil velocity and temperature on the rate of corrosion of crude oil transmission pipelines of Maysan oil fields southern Iraq. The Potentiostatic corrosion test technique was conducted into two types of carbon steel pipeline (materials API 5L X60 and API 5L X80). The computer software ECE electronic corrosion engineer was used to predict the influences of CO2 partial pressure, the composition of crude oil, flow velocity of crude oil and percentage of material elements of carbon steel on the rate of corrosion. As a result, the carbon steel API 5L X80 indicates good and appropriate resistance to corrosion compared to carbon steel API

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
DFT Calculations and Experimental Study to Inhibit Carbon Steel Corrosion in Saline Solution by Quinoline-2-One Derivative: Carbon Steel Corrosion
...Show More Authors

A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were st

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Caspian Journal Of Environmental Sciences
Efficacy of nanoparticle zinc oxide in the resistance of fungus Rhizoctonia solani causing black scurf disease in local potatoes
...Show More Authors

Scopus (4)
Scopus
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Phytoremediation of Chromium and Copper from Aqueous Solutions Using Hydrilla verticillata
...Show More Authors

The current study included testing the ability of plant Hydrilla verticillata (L. F.) on the accumulation of two heavy metals in its tissues, and use the plant in phytoremediation. The plant was exposure to different concentrations of chromium and copper metals (2.5, 5, 10, 15, 20) ppm, for a period of fourteen days, for each solution.The results showed that Hydrilla was more efficient in the removal of chromium, where the amount of the remaining concentration of chromium at the last day of the experiment was (0.20 ± 0.014- 0.66 ± 0.114- 0.99 ± 0.176- 0.79 ± 0.073- 1.80 ± 0.131) ppm, while for copper was (0.33 ± 0.06- 1.13 ± 0.39- 1.66 ± 0.05- 1.96 ± 0.043- 2.33 ± 0.0497) ppm at the last day of the experiment, respectively.

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Copper Wires Coated with Enamel
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Sep 22 2021
Journal Name
International Journal Of Corrosion And Scale Inhibition
Role of vitamin C in the protection of the gum and implants in the human body: theoretical and experimental studies
...Show More Authors

The article describes a study on the role of vitamin C as a protective agent for the teeth, gum, and implants using quantum chemical calculations and polarization tests. The Density Functional Theory (DFT) at 6-311G (d, p) basis set is used to estimate the ability of vitamin C to inhibit the corrosion of the abovementioned parts. The experimental study was performed in a at human body media simulator (Hank’s balanced salt solution) at a temperature of 37°C. The compound was optimized for its ground state, physical properties, and corrosion parameters. Further, HOMO, LUMO, energy gap, dipole moment, and other parameters were used to predict the inhibitor’s efficiency. Gaussian 09, UCA-FUKUI, MGL tools, DSV, and LigPlus software was used

... Show More
View Publication
Scopus (34)
Crossref (6)
Scopus Clarivate Crossref