The current research aims at finding out how to properly and correctly manage waste and solid waste and reduce the difficulties faced by all countries. However, it is becoming increasingly acute in developed cities because their economies are growing rapidly. It is necessary to identify the modern methods used in developed countries in managing wastes. The use of modern waste management techniques is a coordinated effort by international agencies within the borders responsible for them. The problem of the study can be identified in the lack of clarity of environmental management procedures in place. The importance of the research contributes to providing greater capacity to the administrative and technical leadership in the municipality
... Show MoreOndansetron hydrochloride (ONH) is a very bitter, potent antiemetic drug used for the treatment and/or prophylaxis of chemotherapy or radiotherapy or postoperative induced emesis. The objective of this study is to formulate and evaluate of taste masked fast dissolving tablet (FDTs) of ONH to increase patient compliance.
ONH taste masked granules were prepared by solid dispersion technique using Eudragit E100 polymer as an inert carrier. Solvent evaporation and fusion melting methods were used for such preparation.
Completely taste masking with zero release of drug in phosphate buffer pH 6.8was obtained from granules prepared by solvent evaporation method using drug: polymer ratio of 1:2, from which four formulas pas
... Show MoreThe steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengt
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreIn this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreTwo different polyvinyl alcohol/polyvinyl chloride (PVA/PVC) hollow fiber composite nanofiltration membranes were prepared after PVC hollow fiber membranes were coated using dip-coating method with PVA aqueous solution, which was composed of PVA, fatty alcohol polyoxyethylene ether (AEO9), and water [PVA/AEO9/water (4:0.5:95.5) wt%]. Effect of two different PVC hollow fiber immersion times in coating solution were studied. Cross-section, internal and external surfaces of the PVC hollow fibers and PVA/PVC composite nanofiltration membranes structures were characterized by scanning electron microscopy (SEM), pure water permeation flux and solutes rejection. It was found that, the coating layer thickness on the outer surface of the 19 wt% P
... Show More
