Hydrochloric acid (HCl) is a substance that is frequently utilized in industrial operations for important tasks such as chemical cleaning and pickling metallic surfaces.Therefore, the corrosion inhibition ability of three newly synthesized quinazoline derivatives namely, 3-allyl-2-(propylthio) quinazolin-4(3H)-one) (APQ), (3-allyl-2-(allylthio) quinazolin-4(3H)-one) (AAQ), (3-allyl- 2-( Prop -2-yn -1-ylthio) Quinazolin - 4 (3H) - one) (AYQ) were theoretically determined and these compounds were characterized using Fourier Transform Infra-Red (FTIR) and 1H and 13C Nuclear Magnetic Resonance (NMR) spectroscopic. A series of quantum chemical properties of these derivatives: EHOMO, ELUMO, energy gap (ΔE),dipole moment (μ), hardness (η), softness (Ϭ), absolute electronegativity (χ), fractions for electron transferred (ΔN), the ionization potential (I), (TE) and total energy were calculated. The obtained results of all quinazoline derivatives (APQ,AAQ,andAYQ) show almost the same corrosion inhibition with excellent efficiency. Density function theory (DFT) was used to investigate the relationship between the molecular structures and inhibitory efficacies of three quinazoline derivatives. The results of the analysis and measurement of Egap values revealed that the compound AYQ had a modest Egap of 4.999 eV and that strong values of Egap suggest that it will be easier to remove one electron from the HOMO orbital and deposit it in the LUMO orbital
Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreThis manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions
A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods used to calculate this function and this decision is
... Show Moreteen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel
... Show MoreAlzheimer’s Disease (AD) is the most prevailing type of dementia. The prevalence of AD is estimated to be around 5% after 65 years old and is staggering 30% for more than 85 years old in developed countries. AD destroys brain cells causing people to lose their memory, mental functions and ability to continue daily activities. The findings of this study are likely to aid specialists in their decision-making process by using patients’ Magnetic Resonance Imaging (MRI) to distinguish patients with AD from Normal Control (NC). Performance evolution was applied to 346 Magnetic Resonance images from the Alzheimer's Neuroimaging Initiative (ADNI) collection. The Deep Belief Network (DBN) classifier was used to fulfill classification f
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreMany image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show More