Preferred Language
Articles
/
ijcpe-476
Anodic Polarization of Mild Steel in Saturated C a(OH)2 Contaminated with NaCl in Presence of NaNO2
...Show More Authors

The corrosion  behavior  of mild sleet  in saturated  aerated  and de-aerated  Ca(OH)2 solution  was  investigated  using electrochemical measurements. The work was carried out with small coupons immersed in solutions containing different quantities of NaCl in presence of various NaN02 concentrations as corrosion inhibitors. It has been found thal:(1 ) In presence  of NaCl,  the time required  to reach O2  evolution potential  in de-aerated  Ca(OH)2 polarized  at  10μA/cm 2 is function of inhibitor concentration and it becomes lass as NaN02 increases compared with zero presence indicating the effectiveness of NaN02 as anodic corrosion  inhibitor. (2) In absence of NaCl, the Lime required to reach O2 evolution potential in de-aerated solutions is less that in aerated solutions when inhibitor increases from 0 to 0.3 wt. %. (3) In presence  of sufficient  chloride in de-aerated Ca(OH)i solution, the passive film  may broken down locally.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 02 2022
Journal Name
Clinical Oral Investigations
Development of a remineralizing calcium phosphate nanoparticle-containing self-etching system for orthodontic bonding
...Show More Authors
Abstract<sec> <title>Objectives

This study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.

Materials and Methods

nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of rock strength from sonic log for Buzurgan oil field: A Comparison study
...Show More Authors

It is very difficult to obtain the value of a rock strength along the wellbore.  The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand.  In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field.  Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method.  Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation.  Evaluations th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Cu(I)-Folic Acid Complex A Theoretical and Experimental Study
...Show More Authors

Copper (I) complex containing folic acid ligand was prepared and characterized on the basis of metal analyses, UV-VIS, FTIR spectroscopies and magnetic susceptibility. The density functional theory (DFT) as molecular modeling calculations was used to determine the donor atoms of folic acid ligand which appear clearly at oxygen atoms binding to hydrogen. Detection of donation sights is supported by theoretical parameters such as geometry, mulliken population, mulliken charge and HOMO-LUMO gap obtained by DFT calculations.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Adsorption of Some Alephatic Dicarboxylic Acids on Zinc Oxide: A kinetic and Thermodynamic Study
...Show More Authors

The adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Surgical Case Reports
Agenesis of flexor pollicis longus without thenar hypoplasia: a case report and literature review
...Show More Authors
Abstract<p>We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF THE GENUS POLLENIA ROB.-DESVOIDY, 1830 (DIPTERA : CALLIPHORIDAE) FROM IRAQ
...Show More Authors

This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.

View Publication Preview PDF
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Oral And Maxillofacial Surgery
Characteristics of mandibular injuries caused by bullets and improvised explosive devices: a comparative study
...Show More Authors

The purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci

... Show More
View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref