Preferred Language
Articles
/
wRYeYYcBVTCNdQwCDEiY
Synthesis and characterization of some 2-sulphanyl benzimidazole derivatives and study of effect as corrosion inhibitors for carbon steel in sulfuric acid solution
...Show More Authors

This research involves the synthesis of some sulphanyl benzimidazole derivatives (Ia-c), which were prepared from reaction of 2-mercaptobenzimidazole substituted benzyl halide, and structures were identified by spectral methods[FTIR, 1H-NMR and 13C-NMR].These compounds were investigated as corrosion inhibitors for carbon steel in 1M H2SO4 solution using weight loss, potentiostatic polarization methods; obtained results showed that the sulphanyl benzimidazole derivatives retard both cathodic and anodic reactions in acidic media, by virtue of adsorption on the carbon steel surface. This adsorption obeyed Langmuir’s adsorption isotherm. The inhibition efficiency of (Ia-c) ranging between (65-92) %. By using different Ib derivative concentration and temperature, the carbon steel corrosion rate was decreased with increasing Ib concentration and the highest inhibition efficiency reach to 92.8% by using 4.6×10-4 M Ib concentration at 308 K,the inhibition efficiency increases with increasing temperature ranging(308-338)K.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 16 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Evaluation of Implant Stability Following Sinus Augmentation Utilizing Bovine Bone Mixed with Platelet-Rich Fibrin
...Show More Authors

Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Misan Journal For Academic Studies
The microhardness Property of the Biomedical commercially pure titaniumstrontium oxide composite alloy after anodic oxidation
...Show More Authors

Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
e Timoshenko Three-Beams Technique To Estimate The Main Elastic Moduli Of Orthotropic Homogeneous Materials
...Show More Authors

 A New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iop Conference Series: Earth And Environmental Science
Effluent Quality Assessment Monitoring of Al-Rustamiya Sewage Treatment Plant Using Geographical Information System (GIS)
...Show More Authors
Abstract<p>Water quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Laser And Particle Beams
Surface morphology modifications of human teeth induced by a picosecond Nd:YAG laser operating at 532nm
...Show More Authors

Scopus (11)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref
Publication Date
Sat Oct 14 2023
Journal Name
Environmental Monitoring And Assessment
The technique of arsenic elimination from contaminated soil with enhanced conditions by electro-kinetic remediation
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Earthquake And Structures
Response of circular footing on dry dense sand to impact load with different embedment depths
...Show More Authors

Scopus (8)
Scopus
Publication Date
Sun Dec 01 2019
Journal Name
Civil Engineering Journal
Structural Behavior of High Strength Laced Reinforced Concrete One Way Slab Exposed to Fire Flame
...Show More Authors

In this study, an experimental investigation had conducted for six high strength laced reinforced concrete one-way slabs to discover the behavior of laced structural members after being exposed to fire flame (high temperature). Self-compacted concrete (SCC) had used to achieve easy casting and high strength concrete. All the adopted specimens were identical in their compressive strength of ( , geometric layout 2000 750 150 mm and reinforcement specifics except those of lacing steel content, three ratios of laced steel reinforcement of (0.0021, 0.0040 and 0.0060) were adopted. Three specimens were fired with a steady state temperature of  for two hours duration and then after the specimens were cooled suddenly by spraying water. The

... Show More
View Publication
Crossref (4)
Crossref