In this work, synthesized N4,N4`-bis(2, 3, 4 nitro benzylidene) biphenyi-4-4`-diamine(B1-B3) , was tested as an inhibitors in controlling the corrosion of carbon steel in NaCl 3.5% solution by using open circuit potential (OCP),at four different temperatures (293, 303, 313 and 323 K). Furthermore, the surface morphology was investigated using the Atomic force microscopy (AFM). The effect of using different Schiff bases and temperature was also investigated. Schiff bases was synthesized and characterized via using. Fourier Transform Infrared Spectroscopy (FT-IR)and Atomic Force Microscope (AFM) characterized . The experimental results shown that Schiff bases can consider as an excellent corrosion inhibitors for carbon steel in NaCl 3.5% solution, by presence of Schiff bases the corrosion of carbon steel was significantly suppressed. The inhibition efficiency is decreased with the increases of temperature. Kinetic and thermodynamic activation parameters (Ea, A, ΔH*, ΔS* and ΔG*) were calculated.
Three mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreAbstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreThis research deals with the financial reporting for non-current assets impairment from the viewpoint of international accounting standards, particularly IAS 36 "Impairment of non-current assets." The research problems focus on the presence of internal and external indicators on impairment of non-current assets in many of companies listed in Iraqi stock exchange. So it is required to apply IAS 36 to reporting for the impairment loss of assets since this impairment impact certain financial indicators. These indicators help users in their decision-making and forecasting future financial situation and the ability of the company to achieve future profits or maintain current profits. The research aims to shedding lig
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More