Potentiostatic polarization and weight loss methods have been used to investigate the corrosion behavior of carbon steel in sodium chloride solution at different concentrations (0.1, 0.4 and 0.6) M under the influence of temperatures ( 293, 298, 303, 308 and 313) K. The inhibition efficiency of the amoxicillin drug on carbon steel in 0.6 M NaCl has also been studied based on concentration and temperature. The corrosion rate showed that all salt concentrations ( NaCl solution) resulted in corrosion of carbon steel in varying ratio and 0.6 M of salt solution was the highest rate (50.46 g/m².d). The results also indicate that the rate of corrosion increases at a temperature of 313 K.. Potentiodynamic polarization studies showed that the examined inhibitor suppress both anodic and cathodic process and behave as mixed type inhibitor. The adsorption of amoxicillin was found to obey Langmuir isotherm model. Arrhenius equation and transition state theory were used to calculate kinetic and thermodynamic parameter. Results obtained showed that corrosion reaction of carbon steel in NaCl is spontaneous and there is a good agreement between the data got from the both techniques employed. SEM analysis was performed to study the film persistency of the inhibitor.
The Arabs muslim , throughout the historical ages, had many and varied contributions in various fields of science and knowledge, and in all scientific disciplines. They were preceded by scholars of other sects, so their books were translated into Arabic and they added to it many of their scientific research and writings that affected Arab and Islamic libraries, as these scientific research turned into basic references for the benefit of students of science in this field, and they did not stop at that, but built observatories, and invented They developed many astronomical devices in their time and observed the planets and stars, drew maps for them and determined their locations
The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.
The present study aimed to identify the problems thatthe students of College of Education, for women in Iraqia university are suffering from and how to overcome them. thesample of the study contained of (392) student which forms (20%) of the basic sample which is (2180) student, distributed on the six departments of the college they have been chosen randomly and the researcher has used the descriptive analytic method by applying one contains (67) items distributed on six fields,they are as follows: study skills field, academic field, curriculums field, students- teacher relationship field, examinations field, students family field,.
The study has come with
... Show MoreEight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show Moreيهدف البحث لمحاولة دراسة واقع ادارة الوقت لدى عينه من رؤوساء الأقسام العلمية في كليات ومعاهد هيئة التعليم التقني اذ بلغ حجم العينة (47% ) فرداً تم احتيارهم عشوائياً من (15) كلية ومعهد موزعة في (69 من محافظات القطر وبلغ حجم عينة البحث (17%) من عدد رؤوساء الاقسام العلمية في الهيئة ، ولغرض جمع البيانات تم أعداد استمارة استبيان تمت صياغتها بشكل يؤمن توثيق الوقت الفعل
... Show Moreاتجهت دول العالم الى تسخير جميع الإمكانيات والخبرات والعلوم من اجل الوصول الى مستويات متقدمة في الرياضات المختلفة ويهدف التدريب الرياضي إلى إعداد اللاعبين إعدادا جيدا تكمن مشكلة البحث من خلال خبرة الباحثتان الميدانية ومتابعة تدريبات لاعبي المدرسة التخصصية كرة اليد فقد لوحظ هناك ضعف واضح في الأداء المهاري ولابد من تطوير أوجه الضعف لتحقيق مستوى انجاز افضل . ويهدف البحث اعداد تمرينات خاصة بأستخدام جهاز ا
... Show More