A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in (3.5% NaCl) and (0.5M HCl) solutions were studied using potentiometric polarization measurements. The results revealed that the (%IE) in the salty solution (94.98%) is greater than that in the acidic solution (81.40%). The thermodynamic parameters obtained, supported the physical adsorption mechanism and the adsorption followed the Langmuir adsorption isotherm. The surface changes of the carbon steel were studied using SEM (Scanning Electron Microscopy) and AFM (Atomic Force Microscopy) techniques.
The loss of dental hard tissue as a result of odontoclastic activity is known as root resorption. It is unwanted and pathological in permanent teeth. Root resorption may happen within the root canal called internal root resorption or on the outer surface of the root called external root resorption. Regardless of where it occurs, root resorption is irreparable, can cause pain for the patient, necessitates treatment, and in some circumstances, resulting in the early loss of the affected tooth. It might be challenging to precisely diagnose and treat root resorption. There is limited information within literatures on root resorption therefore this review aims to understand the radiological and clinical characteristics of r
... Show MoreBack ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most
For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThe purpose of this paper is to develop a hybrid conceptual model for building information modelling (BIM) adoption in facilities management (FM) through the integration of the technology task fit (TTF) and the unified theory of acceptance and use of technology (UTAUT) theories. The study also aims to identify the influence factors of BIM adoption and usage in FM and identify gaps in the existing literature and to provide a holistic picture of recent research in technology acceptance and adoption in the construction industry and FM sector.
The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show MoreThe aim of this research is to find out why some matrix verbs are no longer complemented by the two types of infinitive clauses as it is the case in Elizabethan English . At that time (when Shakespeare was writing ), the same matrix verb triggers the two types of infinitive clauses as its complex transitive complementation .Such free variation is not possible in Present –Day English . In this corpus – based study , it is shown that the choice of the form of the infinitive clause is not free; there are certain syntactic ,sem- antic constraints that dete, - infinitive.
Objectives: The objectives of the present study are to identify both, the rate of urinary tract infections (UTI) in medical
and surgical wards in Baghdad Teaching Hospital and the common types of microorganisms that cause this type of NIs,
study the resistance of isolated microorganisms to several types of antibiotic and the effect of some disinfection
material like Iodine, chlorhexidine and septicin on the growth of these isolates.
Methodology: This is descripƟve study carried out from 1\6\2009 to 1\11\2009. A total of 200 paƟents were admiƩed
to medical and surgical wards in Baghdad teaching hospital, paƟents were divided into two group 100 paƟents, in
surgical ward and 100 paƟents in medical ward. Some of impor
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More