Preferred Language
Articles
/
bsj-7749
Enhancement of corrosion protection of metal carbon steel C45 and stainless steel 316 by using inhibitor (Schiff base) in sea water
...Show More Authors

This research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was studied by cathode and anode polarization through which all corrosion parameters were investigated which include: corrosion current icorr (1341× 10-7-  5393 × 10-9A/cm2), corrosion potential Ecorr (-1.031-  -0.227 mV vs SCE) , corrosion rates CR (0.658-0.007 mm.y-1), inhibition efficiency %IE (92-98%), and energy activation barriers Ea (4.709-26.733 kJ/mole). The thermodynamic and kinetic properties of the corrosion behavior of these two metals under study, which include: enthalpy ∆H*(2.153-24.176 kJ/mole), entropy ∆S*(-197 -156 J/mole), and free Gibbs energy ∆G*(59.87-74.56 kJ/mole) before and after using the inhibitor, were also studied.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Thermal Analysis of a New Acidicazo Ligand's Metal Complexes
...Show More Authors

The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed May 16 2012
Journal Name
Journal Of Kerbala University
Synthesis and Characterization of Heterocyclic Azo Dye Complexes with Selected Metal Ions
...Show More Authors

Coupling reaction of 4-amino antipyrene with 2,6-dimethyl phenol gave bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII, ZnII, CdII, and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UVVis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the complexes formed were studied followin

... Show More
Publication Date
Wed Nov 03 2021
Journal Name
International Journal Of Energy Research
Simulation and experimentation study on the performance of metal hydride storage vessels
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 03 2021
Journal Name
International Journal Of Energy Research
Simulation and experimentation study on the performance of metal hydride storage vessels
...Show More Authors

This paper details the process of designing, analysing, manufacturing, and testing an integrated solid-state hydrogen storage system. Analysis is performed to optimise flow distribution and pressure drop through the channels, and experimental investigations compare the effects of profile shape on the overall power output from the fuel cell. The storing of hydrogen is given much attention in the selection of a storage medium, and the effect of a cooling system to reduce the recharging time of the hydrogen storage vessel. The PTFE seal performed excellently, holding pressure over 60 bar, despite requiring changing each time the cell is opened. The assembly of the vessel was simple and straightforward, and there was no indication of pressure

... Show More
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The initiative of the Central Bank of Iraq and its impact on some banking activities provided by specialized banks
...Show More Authors

Specialized banks provide their banking activities to their customers at interest rates that are determined according to the approved bank policy, which is almost similar to most or most banks. To satisfy the financial desires of customers and at the same time it is a source of the bank's profits, However, these banks have been introduced to new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) to address the economic stagnation that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives amounting to nearly (15) trillion dinars, which were put forward through private commercial and Islamic banks and specialized

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Physics
A comparison between PCA and some enhancement filters for denoising astronomical images
...Show More Authors

This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used. Experimental results shows LPG-PCA method

... Show More
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
A comparison between PCA and some enhancement filters for denoising astronomical images
...Show More Authors

This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.

Experimental results shows LPG-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref