In this research, an organobentonite (HDTMA-BT) was prepared by modifying a jordanian bentonite (BT) with hexadecyltrimethylammonium bromide. By means of in situ free radical polymerization in THF with AIBN as the initiator, this organobentonite is used to prepare the polymethylmethacrylate-bentonite (PMA-HDTMA-BT) nanocomposite. Scanning electron microscopy (SEM), x-ray diffraction (XRD), energy dispersive spectrometer (EDS) and Fourier transform infrared (FTIR) spectroscopy were used to characterize both HDTMA-BT and PMA-HDTMA-BT. Those adsorbents were used in a batch process to remove Pb(II), Cr(III) ions, and p-chlorophenol (PCP) from aqueous solution. Investigated factors included adsorbent dosage, initial pH solution, contact time, and temperature. Adsorption data more fitted the Langmuir and D-R isotherms than the Freundlich isotherm. The maximum adsorption capacities, qmax, obtained from the Langmuir adsorption isotherm were 172.414 mg/g, 303.030 mg/g, 10.020 mg/g, 25.641 mg/g, 76.336 mg/g, and 163.934 mg/g for Pb/HDTMA-BT, Pb/PMA-HDTMA-BT, Cr/HDTMA-BT, Cr/PMA-HDTMA-BT, PCP/HDTMA-BT, and PCP/PMA-HDTMA-BT, respectively. The results on adsorption were found to be well-fit by the pseudo-second order kinetics model. The uptake of Pb(II), Cr(III) ions, or PCP onto HDTMA-BT and PMA-HDTMA-BT nanocomposite was primarily regulated by intraparticle diffusion, but boundary layer diffusion also took place in the adsorbate-adsorbent system. pH and temperature significantly influenced the adsorption process and negative values of suggest that the adsorption process was spontaneous and feasible.
This study included the preparation of the mixture aquatic extracts of Peganum harmala seeds and Pericarp of Punica granutum at concentration (10+50) ?(15+55)? (20+60) mgml .To study the influence of the mixture on the percentage of vitality of the protoscolices of E. granulosus In vitro, as the vitality of protoscolices had caused complete death when the using concentration at time 120,90,60 minute respectively. Also study the effect of mixture in white mice with infectious protoscolices In vivo and study the change occurred in the averages of the weights of the liver and spleen and the averages of its distension In vivo in processed group with mixture at concentration (15+55) , (10+50)mgml ,as which was approach to the negative gro
... Show MoreThe current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show MoreThe research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).
The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,
... Show MoreThe aim of this research is to show the level of banking leadership trends in the importance of organizational confidence and its reflection in the dimensions of the strategic position the research was applied in a bank (Al- Mansour Investment, Business Bay), and the Questionnaire Was adopted as a tool to collect data and information from the number of the sample (15) who are in allocation (Department Manager, Department Manager Department Manager, Division Officer, Unit Officer) and he used the statistical program (spss) to calculate (standard deviation, arithmetic mean, percentages, regression, analysis,F-test coefficient of determination R2, Coefficieent, square Kay and the research reached a number of conclusions, the mos
... Show MoreA field experiment was carried out at the research station of the College of Agriculture - Wasit University / Kut, during the fall season 2021 in soil with texture (sandy mixture) using the RCBD design in the arrangement of splintered plates and with three replications, to study the effect of spraying different combinations of organic emulsion (Appetizer) and NPK nano fertilizer with urea fertilizer on the growth of synthetic cultivars of yellow corn. The main panels included three synthetic varieties of yellow corn (Fajr1, Sumer and Baghdad3), which symbolized by (V1,V2,V3) in sequence, while the secondary panels included five fertilization treatments in which mineral fertilizer (urea) was used 46% nitrogen with the full recomme
... Show MoreThe cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show MoreMethotrxate (MTX) has become the standard of care and first-line therapy for patients who have RA and consider as a gold standard of treatment for RA. The role of MTX in the treatment of RA has now been well established. The use of MTX treatment of RA inhibits proliferation of the lymphocytes, reduces signs and symptoms this disease, reduces progression damage of the joints and improves quality of life outcome. Progranulin (PGRN) acts a role in autoimmune inflammatory, has important function in several processes including immune response. Present study has conducted to find the effect of MTX drugs as a therapeutic target for RA patients because of its ability to bind with tumor necrosis factor receptor (TNFR), with progranulin, obestatin an
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More