Abstract
The present study investigates the effect of acetic acid on corrosion behavior and its potential of hydrothermally sealed anodized AA2319-Al-alloys. Anodizing treatment was performed in stagnant phosphoric acid electrolyte with or without addition of acetic acid. Hydrothermal sealing was carried out in boiling water for each anodized specimen. The open circuit potential of the unsealed and sealed anodized samples was examined using open circuit potential measurement for the purpose of starting in scanning polarization diagrams. The potentiostatic polarization technique measurements were performed to assess corrosion behavior and sealing quality (i.e., degree of sealing) of
... Show MorePolycyclicacetal was prepared from the reaction of PEG with aldehyde derived from Erythro-ascorbic acid (pentulosono-ɣ-lactone-2,3-enedianisoate).All these compounds were characterized by Thin Layer Chromatography (TLC) and FTIR spectra and aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR, and mass spectra.The inhibitory effect of prepared polymer on the activity of human serum AcetylCholinesterase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.7x10-3 – 4.7x10-8M).
The aim of this paper is adopted to give an approximate solution for advection dispersion equation of time fractional order derivative by using the Chebyshev wavelets-Galerkin Method . The Chebyshev wavelet and Galerkin method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are described based on the Caputo sense. Illustrative examples are included to demonstrate the validity and applicability of the proposed technique.
The Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show MoreAbstract Background: The prevalence of heart failure (HF) continues to increase with an increase in the aging population. Palliative care should be integrated into routine disease management for all patients with serious illness, regardless of settings or prognosis. Objectives: The purposes of this study were to determine the level of knowledge of nurses concerning palliative care for patients with heart failure after implementation of instructional program. Design: The study was a quasi-experimental study and consists of 60 nurses. Setting: The study was conducted between17th November 2021, to 10th February 2022, at three teaching hospitals in Baghdad city, Iraq. Method: A non-probability (purposive) sample was utilized, nurses who agreed
... Show MoreThe derivation of 5th order diagonal implicit type Runge Kutta methods (DITRKM5) for solving 3rd special order ordinary differential equations (ODEs) is introduced in the present study. The DITRKM5 techniques are the name of the approach. This approach has three equivalent non-zero diagonal elements. To investigate the current study, a variety of tests for five various initial value problems (IVPs) with different step sizes h were implemented. Then, a comparison was made with the methods indicated in the other literature of the implicit RK techniques. The numerical techniques are elucidated as the qualification regarding the efficiency and number of function evaluations compared with another literature of the implic
... Show MoreIn this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.
We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.
Dynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.