The corrosion behavior of mild sleet in saturated aerated and de-aerated Ca(OH)2 solution was investigated using electrochemical measurements. The work was carried out with small coupons immersed in solutions containing different quantities of NaCl in presence of various NaN02 concentrations as corrosion inhibitors. It has been found thal:(1 ) In presence of NaCl, the time required to reach O2 evolution potential in de-aerated Ca(OH)2 polarized at 10μA/cm 2 is function of inhibitor concentration and it becomes lass as NaN02 increases compared with zero presence indicating the effectiveness of NaN02 as anodic corrosion inhibitor. (2) In absence of NaCl, the Lime required to reach O2 evolution potential in de-aerated solutions is less that in aerated solutions when inhibitor increases from 0 to 0.3 wt. %. (3) In presence of sufficient chloride in de-aerated Ca(OH)i solution, the passive film may broken down locally.
This study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.
nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h
It is very difficult to obtain the value of a rock strength along the wellbore. The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand. In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field. Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method. Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation. Evaluations th
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreCopper (I) complex containing folic acid ligand was prepared and characterized on the basis of metal analyses, UV-VIS, FTIR spectroscopies and magnetic susceptibility. The density functional theory (DFT) as molecular modeling calculations was used to determine the donor atoms of folic acid ligand which appear clearly at oxygen atoms binding to hydrogen. Detection of donation sights is supported by theoretical parameters such as geometry, mulliken population, mulliken charge and HOMO-LUMO gap obtained by DFT calculations.
The adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreWe present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.
This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThe purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci
... Show More