INFLUENCE OF SOME FACTOR ON SOMATIC EMBRYOS INDUCTION AND GERMINATION OF DATE PALM BARHI C.V BY USING CELL SUSPENSION CULTURE TECHNIQUE
This study was prepared to investigate the performance and behavior of concrete thrust blocks supporting pipe fittings. In the water distribution networks, it is always necessary to change the path of the pipes at different degrees or to create new branches. In these regions, an unbalanced force called the thrust force is generated. In order to counter this force, these regions are supported with concrete blocks. In this article, the system components (soil, pipe with its bend and thrust blocks) have been numerically modeled and simulated by the ABAQUS CAE/2019 software program in order to study the behavior and stability of the thrust block with different burial conditions (several b
An increasing number of emerging contaminants have been detected in surface waters, sediment, soil and ground water in different locations in the world, which is a new environmental challenges need an actual concern for international scientific and legislative communities.
The nonprescription and huge used pharmaceuticals ibuprofen and diclofenac sodium will be focused in this study. New adsorbent developed using cheap inorganic clay material (bentonite) and organic polymer polyureaformaldehyde (PUF), the combination of these two materials gave the surface more roughness with wide active site distribution. Batch adsorption experiment performed to each pharmaceutical individually to determine the optimum separat
... Show MoreA new spectrophotometric method for individual and simultaneous determination of cefixime and cephalexin depending on the first and second derivative mode techniques. The first and second derivative spectra of these compounds permitted individual and simultaneous determination of cefixime and cephalexin in concentration interval of (4– 24μg.ml-1 ) by measuring the amplitude of peak-to-base line, pea to peak at certain wavelengths and the area under peak at selected spectrum intervals. The methods showed reasonable precision and accuracy and have been applied to determine cefixime and cephalexin in two different pharmaceutical preparations.
Background: Tumors of the oral cavity are under
estimated in general dental and medical practice,
some authors describe it as the forgetting disease,
others wondering if the attention paid to this disease
compared to its fatality (The 5-year survival rate is
about 50%) is enough for disease control? However;
this disease deserves a comprehensive assessment by
all dental and medical fields assumed to examine the
oral cavity regularly, especially otolaryngologist.
Objectives: To find out the sensitivity and specificity
of clinical examination in diagnosing oral tumors and
premalignant conditions by otolaryngologist.
Methods: Across sectional retrospective study was
conducted in the:
-study design:
The research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreAn environmentally friendly technique was used to prepare titanium dioxide@ silver (core shell) (TiO₂@Ag NPs) using chard leaf extract, a natural stabilizer and reductant. A nanocomposite (NCs) of TiO₂@Ag supported by halloysite nanotubes (HNTs), TiO2@Ag/HNT NCs, was prepared under microwave irradiation. The microwave technique is used to accelerate the reaction and enhance the homogeneity of nanoparticle distribution. Spectroscopic and structural analyses were performed on the resulting nanocomposite. X-ray diffraction (XRD) revealed a clear crystalline structure with grain sizes ranging from 7 to 15 nm, with an average of ~11 nm, the transmission electron microscope (TEM) revealed that the size of nanoparticles in the TiO₂@Ag/HNT N
... Show More