In this work, some of new 2-benzylidenehydrazinecarbothioamide derivatives have been prepared by condensation of thiosemicarbazide and different substituted aromatic benzaldehydes in presence of glacial acetic acid to give compounds (1-6), these compounds have characterized by its physical properties and spectroscopic methods. This work also included theoretical study to prove the ability of these compounds as corrosion inhibitors; The program package of Gaussian 09W with its graphical user interface GaussView 5.0 had used for this purpose; the methods of Density Functional Theory (DFT) with basis set of 6-311G (d,p) / hybrid function of B3LYP and semiempirical method of PM3 have been used, the study included theoretical simulation to simulate the reactivity of these compounds as corrosion inhibitors for carbon steel in gas phase, aqueous medium and in acidic medium (acidic medium is a medium contains acid that able to protonate these compounds and change them to protonated form), some parameters have calculated in both previous methods such EHOMO, ELUMO, ΔEL-H, Ionization Potential (I), Electron Affinity (A), electronegativity (χ), Global Hardness (η), Atomic Charges, Dipole Moment (μ) and Fraction of Electron Transferred from Inhibitor Molecules to the Metallic Atoms (ΔN), the resulted parameters showed that these compounds are behaving as inhibitors for corrosion of carbon steel.
This work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
A study of some mite species of alfalfa. wheat, and barley was conducted in central Iraq.
The mites were extracted using a tullgren funnel method. Twelve species were recorded. 10 of
them belong to suborder Trombidiformes and 2 belong to suborder Sarcoptiforms. Three
mites, Irnpar(pes hystricinus, Scutacarus longitarsus, and Rhizoglyphus echin opus are new
records for Iraqi mite fauna, and 11 are new host records in alfalfa soil.
Translation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t
... Show MoreSemiparametric methods combined parametric methods and nonparametric methods ,it is important in most of studies which take in it's nature more progress in the procedure of accurate statistical analysis which aim getting estimators efficient, the partial linear regression model is considered the most popular type of semiparametric models, which consisted of parametric component and nonparametric component in order to estimate the parametric component that have certain properties depend on the assumptions concerning the parametric component, where the absence of assumptions, parametric component will have several problems for example multicollinearity means (explanatory variables are interrelated to each other) , To treat this problem we use
... Show MoreIn the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreAs a result of recent developments in highway research as well as the increased use of vehicles, there has been a significant interest paid to the most current, effective, and precise Intelligent Transportation System (ITS). In the field of computer vision or digital image processing, the identification of specific objects in an image plays a crucial role in the creation of a comprehensive image. There is a challenge associated with Vehicle License Plate Recognition (VLPR) because of the variation in viewpoints, multiple formats, and non-uniform lighting conditions at the time of acquisition of the image, shape, and color, in addition, the difficulties like poor image resolution, blurry image, poor lighting, and low contrast, these
... Show Moreنتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول
... Show MoreIn this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.