In this present work, [4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)bis(2-methoxyphenl)(A1),4,4`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene)diphenol(A2),1,1`-(biphenyl-4,4`-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1-ylidene) dinaphthalen-2-ol (A3)]C.S was prepared in 3.5% NaCl. Corrosion prevention at (293-323) K has been studied by using electrochemical measurements. It shows that the utilized inhibitors are of mixed type based on the polarization curves. The results indicated that the inhibition efficiency changes were used with a change according to the functional groups on the benzene ring and through the electrochemical technique. Temperature increases with corrosion current (icorr) and potential (Ecorr) and decreases with CS covered by Schiff bases in the presence of inhibitors and temperatures decrease with efficiency (% PE) of CS in the absence and presence of inhibitors and using several techniques including infrared (FT-IR), scanning electron microscopy (SEM) and atomic force microscopy (AFM). Kinetic and thermodynamic activation parameters (Ea, A, ΔH*, S*, G*) were calculated for prepared vehicles. Then, the biological activity of the prepared compound (A1-A3) showed its efficiency with the use of Gram-positive and Gram-negative bacteria (Staphylococcus aureus, Staph.aure) and (Escherichia coli, E.coli), as well.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen
Rwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show More