In this present work, [4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)bis(2-methoxyphenl)(A1),4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)diphenol(A2),1,1`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene) dinaphthalen-2-ol (A3)]C.S was prepared in 3.5% NaCl. Corrosion prevention at (293-323) K has been studied by using electrochemical measurements. It shows that the utilized inhibitors are of mixed type based on the polarization curves. The results indicated that the inhibition efficiency changes were used with a change according to the functional groups on the benzene ring and through the electrochemical technique. Temperature increases with corrosion current (icorr) and potential (Ecorr) and decreases with CS covered by Schiff bases in the presence of inhibitors and temperatures decrease with efficiency (% PE) of CS in the absence and presence of inhibitors and using several techniques including infrared (FT-IR), scanning electron microscopy (SEM) and atomic force microscopy (AFM). Kinetic and thermodynamic activation parameters (Ea, A, ΔH*, S*, G*) were calculated for prepared vehicles. Then, the biological activity of the prepared compound (A1-A3) showed its efficiency with the use of Gram-positive and Gram-negative bacteria (Staphylococcus aureus, Staph.aure) and (Escherichia coli, E.coli), as well.
Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil and E. rothii Jan from Saffin mountain North of Arbil city North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.
The challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass
... Show MoreNew vision of Mr. Abdul Mahdi Al-Muttafiqi in the light of unpublished documents
The present work represents description of three new species of genus Anthrenus
Geoffory from Iraq, these are : A. aradensis sp. nov., A. fabrici sp. nov. and A.
unicolor sp. nov. Locality, host plants and date of collection were given.
A survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
The present study introduces description of new species of leafhopper Cicadella latreilla nov. External morphological characters particularly female genitalia were discussed and illustrated, shape of male abdominal apodeme, chaetotaxy of genital style and genital plate of male genitalia, shape of Aedeagus and connective . The external morphological characters were: spotting patterns of vertex, face, pronotum of prothorax, and metothorax, and of lower and upper valves of ovipositors,shape of female seventh abdominasternum.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More