The inhibitive action of Phenyl Thiourea (PTU) on the corrosion of mild steel in strong Hydrochloric acid, HCl, has been investigated by weight loss and potentiostatic polarization. The effect of PTU concentration, HCl concentration, and temperature on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in 5-7N HCl at temperatures 30, 40 and 50 °C, in absence and presence of PTU. It was verified that all variables and their interaction were statistically significant. The adsorption of (PTU) is found to obey the Langmuir adsorption isotherm. The effect of temperature on the adsorption process showed that the adsorption process is exothermic, spontaneous and represents mixed chemical and physical adsorption for PTU on the metal surface.
The research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Distribution of light intensity in the flat photobioreactor for microalgae cultivation as a step design for production of bio-renewable energy was addressed in the current study. Five sizes of bioreactors with specific distances from the main light source were adopted as independent variables in experiential design model. The results showed that the bioreactor’s location according to the light source, determines the nature of light intensity distribution in the reactor body. However, the cross-section area plays an important role in determining the suitable location of reactor to achieve required light homogeneity. This area could change even the expected response of the light passing through the reactor if Beer-Lambert's law is adopted.
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreIntegrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In
... Show MoreThis study aimed to reveal the stage for teachers of basic training needs from the perspective of workers in Mafraq Governorate, through a survey of a sample of counselors look at the Ajloun area schools reached (58) counselors.
To achieve the objective of the study was constructed questionnaire where they are finalized (18) items distributed on two dimensions (professional needs, performance requirements) and after confirmation of the validity and reliability have been applied to the sample where the results showed that training needs were high, both on a professional or per formative level .
The results also showed no statistically significant differences in the areas of tool due to gender, educational qualification. The study co
Sustainability is a major demand and need pursued by cities in all areas of life due to the environmental, social and economic gains they provide, especially in the field of city planning and urban renewal projects that aim to integrate the past, present and future.
The research aims to evaluate the Haifa Street renewal project, and Al-Shawaka district, one of the Baghdad districts located next to Al-Karkh, was elected by comparing the sustainability indicators of urban renewal with the reality of the situation through a field survey and questionnaire form and focusing on the social and economic impacts and environmental for the project on the study area. To reach the most important conclusions and recommendations
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More