Preferred Language
Articles
/
bsj-7637
Corrosion Inhibition Efficiency Investigation of Yttrium Oxide Nanoparticles Coated on Carbon Steel Alloy
...Show More Authors

Metal oxide nanoparticles demonstrate uniqueness in various technical applications due to their suitable physiochemical properties. In particular, yttrium oxide nanoparticle(Y2O3NPs) is familiar for technical applications because of its higher dielectric constant and thermal stability. It is widely used as a host material for a variety of rare-earth dopants, biological imaging, and photodynamic therapies. In this investigation, yttrium oxide nanoparticles (Y2O3NPs) was used as an ecofriendly corrosion inhibitor through the use of scanning electron microscopy (SEM), Fourier transforms infrared spectroscopy (FT-IR), UV-Visible spectroscopy, X-ray diffraction (XRD), and energy dispersive X-ray spectroscopy(EDX), the physico-chemical characterization of Y2O3NPs was examined. The primary characteristic peak of YOY at 565 cm-1, which indicates the synthesis of nanoparticles, is seen in the FT-IR spectra. The XRD pattern showed that a single phase cubic structure of YONPs with an Ia-3 space group had formed. SEM was used to examine the surface morphology. The composition of Yttrium and oxygen in Y2O3NPs was determined to be 78.74% and 21.26%, respectively, according to the EDX results. The anticorrosive behavior was tested by polarization curve in 18.204% CaCl2 solution at five temperatures in the range 293- 313 K. Various concentrations 0.15 0.26 and 0.37 of N Y2O3NPs coating on the carbon steel surface were applied using the electrophoresis deposition method. The obtained results indicated that Y2O3NPs formed a protective film acts as a physical barrier for the protection of steel alloy. Additionally, corrosion protection efficiency values of 0.26 N Y2O3NPs coating were superior to that of 0.15 and 0.37 N Y2O3NPs coating, respectively.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Sharia's position on historical statues and monuments
...Show More Authors

A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electro-less Copper Deposition on ABS Plastic
...Show More Authors

CuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.

View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economic And Administrative Science
On Shrinkage Estimation for Generalized Exponential Distribution
...Show More Authors

Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On S-acts and bounded linear operators
...Show More Authors

The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on abortion in Sharia and law
...Show More Authors

Research title: Ruling on abortion in Sharia and law.

The importance of research: Projection is of great importance because it touches the life of a living being who enjoys human qualities. However, this organism often wastes its rights and does not protect its human beings. These souls are lost in millions by the sake of casual desire or hidden desire.

The research plan: The research dealt with an introductory topic, four topics, and in each topic there are demands, branches, and a conclusion.

The most important findings of the study: The ruling on aborting the fetus in the Sharia is only permissible (and the necessity is valued at its va

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 06 2017
Journal Name
Global Journal Of Engineering Science And Researches 4(2348-8034):48-52
ON SEMI-STRONG (WEAK)CJ-TOPLOGICAL SPACES
...Show More Authors