The corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )
... Show MoreDapagliflozin is a novel sodium-glucose cotransporter type 2 inhibitor. This work aims to develop a new
validated sensitive RP-HPLC coupled with a mass detector method for the determination of dapagliflozin, its
alpha isomer, and starting material in the presence of dapagliflozin major degradation products and an internal
standard (empagliflozin). The separation was achieved on BDS Hypersil column (length of 250mm, internal
diameter of 4.6 mm and 5-μm particle size) at a temperature of 35℃. Water and acetonitrile were used as
mobile phase A and B by gradient mode at a flow rate of 1 mL/min. A wavelength of 224nm was selected to
perform detection using a photo diode array detector. The method met the
In the current study, new derivatives were synthesized by reaction of N-hydroxyphthalimide with chloro acetyl chloride in the presence of Et3N as a base to form 1,3-dioxoisoindolin-2-yl 2-chloroacetate (B1), which in turn enters several reactions with different amines where it interacts with primary amines to give 1,3-dioxoisoindolin-2-yl acetate derivatives (B2-B4) in basic medium, in the same way it interacts with these amines but with adding KNCS to form thiourea derivatives (B5-B7). It also reacts with diamines to give bis(azanediyl) derivatives (compounds B8-B10). The prepared derivatives were diagnosed using infrared FTIR and 1HNMR,13CNMR for some derivatives. Compounds B4, B5 and B9 were measured as corrosion inhibitors the inhibitio
... Show MoreSynthetic polymers such as polyurethane are used widely in the field of biomedical applications such as implants or part of implant systems.
This paper focuses on the preparation of base polymer matrix composite materials by (Hand Lay-Up) method, and studying the effect of selected grain size (32, 53, 63, 75, and 90) µm of (Reenia) particles on some properties of the prepared composite.
Mechanical tests were used to evaluate the prepared system (Tensile, Compression, Impact, and Hardness) tests, and a physical test of (Water absorption %), and all tests were accomplished at room temperature.
Where results showed tensile test (maximum tensile strength and modulus of elasticity) high at small grain size while
... Show MoreThis study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreIn this paper, we describe the cases of marriage and divorce in the city of Baghdad on both sides of Rusafa and Karkh, we collected the data in this research from the Supreme Judicial Council and used the cubic spline interpolation method to estimate the function that passing through given points as well as the extrapolation method which was applied for estimating the cases of marriage and divorce for the next year and comparison between Rusafa and Karkh by using the MATLAB program.