In this study, carbon nanotubes were prepared using a pure chemical method modified similar to the Hummers method with simple changes in the work steps. The carbon nanotubes were then coated and reduced on copper and aluminum metals using the electrodeposition method (EDP) for corrosion protection application in seawater medium (NaCl 3.5%) at four different temperatures: 20, 30, 40, and 50 °C, which were studied using three electrode potentiostats. All corrosion measurements, thermodynamics, and kinetics parameters were nominated from Tafel plots. The films deposited by the carbon nanotubes were examined by the SEM technique, and this technique showed the formation of carbon nanotubes.
ENGLISH
Ground penetrating radar (GPR) is one of the geophysical methods that utilize electromagnetic waves in the detection of subjects below the surface to record relative position and shape of archaeological features in 2D and 3D. GPR method was applied in detecting buried archaeological structure in study area in a location within the University of Baghdad. GPR with 3D interpretation managed to locate buried objects at the depth of (1m) . GPR Survey has been carried (12) vertical lines and (5) horizontal lines using frequency antenna (500) MHZ .
Concentrations of four heavy metals, Zinc , Copper , Lead and Cadimium were determed in water and sediment samples collected bi-weekly from six sampling sites on the lower part of River Diyala during low flow period (August to October) and high flow period (April to June). A reference point site (1) was situated upstream the effects of the effluent. Present work describes the e
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreA field experiment was carried out in the province of Najaf - al ashraf using two types of blue-green algae( Anabaena circinalis and Oscillaoria lymentica) which have been isolated and diagnosed in the laboratories of the department of plant protection / ministry of agriculture in Iraq with the compost( palm fronds ) manufacturer locally and by 1 ml : 10 g of organic matter within one month of cuddling and using a single level of humidity is 1 : 2 (water : organic matter). Randomized complete block design RCBD to see the effect of use it as a single or mix in the productivity of rice crop Yasamin cultivar where it was noted that it is equipped with a dynamic composting of organic matter leads to the analysis of organic material and incre
... Show MoreA comparison was conducted between two wells, Kt-1and Kt-2, in Kumait and two wells, Du-1and Du-2, in Dujaila oil fields that belong to Mishrif formation, southern Iraq. Seismic inversion method was employed to detect oil and water reservoirs. The comparison included the behavior of acoustic impedance (AI) of fluids and the lithology with related petrophysical properties. The values of water saturation, Shale volume (Vsh), and effective porosity were compared between the AI, two fluid reservoirs. It was found that the AI value for the oil reservoir unit is relatively low to medium, whereas it was relatively medium for the water reservoir. Effective porosity value showed, in general, an increase in the oil reservoir and
... Show MoreCrab shells were used to produce chitosan via the three stages of deproteinization, demineralization and deacetylation using sodium hydroxide and hydrochloric acid under different treatment conditions of temperature and time. The produced chitosan was characterized using Fourier transform infrared spectroscopy (FTIRS), X-ray diffraction (XRD), high – resolution scanning electron microscopy (HRSEM), electron dispersion spectroscopy (EDS), dynamic light scattering (DLS), Brunauer Emmett Teller (BET) and Thermogravimetric analysis (TGA). The adsorption behavior of chitosan to remove arsenic (As) and copper (Cu) from electroplating wastewater was examined by batch adsorption process as a function of adsorbent dose, contact time and te
... Show More