Hydrochloric acid (HCl) is a substance that is frequently utilized in industrial operations for important tasks such as chemical cleaning and pickling metallic surfaces.Therefore, the corrosion inhibition ability of three newly synthesized quinazoline derivatives namely, 3-allyl-2-(propylthio) quinazolin-4(3H)-one) (APQ), (3-allyl-2-(allylthio) quinazolin-4(3H)-one) (AAQ), (3-allyl- 2-( Prop -2-yn -1-ylthio) Quinazolin - 4 (3H) - one) (AYQ) were theoretically determined and these compounds were characterized using Fourier Transform Infra-Red (FTIR) and 1H and 13C Nuclear Magnetic Resonance (NMR) spectroscopic. A series of quantum chemical properties of these derivatives: EHOMO, ELUMO, energy gap (ΔE),dipole moment (μ), hardness (η), softness (Ϭ), absolute electronegativity (χ), fractions for electron transferred (ΔN), the ionization potential (I), (TE) and total energy were calculated. The obtained results of all quinazoline derivatives (APQ,AAQ,andAYQ) show almost the same corrosion inhibition with excellent efficiency. Density function theory (DFT) was used to investigate the relationship between the molecular structures and inhibitory efficacies of three quinazoline derivatives. The results of the analysis and measurement of Egap values revealed that the compound AYQ had a modest Egap of 4.999 eV and that strong values of Egap suggest that it will be easier to remove one electron from the HOMO orbital and deposit it in the LUMO orbital
The present study deals with successive stages of productive
operations happened to produce a production within each stage befo re it moves to the next one. ll cou ld be deduced that this study is an extension to what bas been mentioned in (1 ) .ln (I), the optimum distribution of di!Terent jobs of workers and machines in the productive operations has been st ud ied whi le the study invol ves the optimum schedule for the succession of these operations presuming that thay have already been distributed on machines and workers (2).A mathematical form has been put for this study to define the "Object.ive Function "
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re
Stemming is a pre-processing step in Text mining applications as well as it is very important in most of the Information Retrieval systems. The goal of stemming is to reduce different grammatical forms of a word and sometimes derivationally related forms of a word to a common base (root or stem) form like reducing noun, adjective, verb, adverb etc. to its base form. The stem needs not to be identical to the morphological root of the word; it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. As in other languages; there is a need for an effective stemming algorithm for the indexing and retrieval of Arabic documents while the Arabic stemming algorithms are not widely available.
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreThe research aims to identify the educational plan for the private and public kindergartens. The researchers selected a sample consisted of (59) female teachers for the private kindergartens and (150) female teachers for the public kindergartens in the city of Baghdad. As for the research tool, the two researchers designed a questionnaire to measure the educational plan for the private and public kindergartens. The results revealed that private kindergartens have educational plans that contribute considerably to classroom interaction, the public kindergartens lack for educational plans. In light of the findings of the research, the researchers recommend the following: the need to set up a unified educational plan for the priv
... Show MoreIn this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.
Fuzzy Based Clustering for Grayscale Image Steganalysis
The method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth
... Show MoreRivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show More