The green synthesis of nickel oxide nanoparticles (NiO-NP) was investigated using Ni(NO3)2 as a precursor, olive tree leaves as a reducing agent, and D-sorbitol as a capping agent. The structural, optical, and morphology of the synthesized NiO-NP have been characterized using ultraviolet–visible spectroscopy (UV-Vis), X-ray crystallography (XRD) pattern, Fourier transform infrared spectroscopy (FT-IR) and scanning electron microscope (SEM) analysis. The SEM analysis showed that the nanoparticles have a spherical shape and highly crystalline as well as highly agglomerated and appear as cluster of nanoparticles with a size range of (30 to 65 nm). The Scherrer relation has been used to estimate the crystallite size of NiO-NP which has been found about 42 nm. The NiO-NPs have subsequently used as adsorbents for adsorption of two types of dyes; methylene blue (MB) as cation dye and methyl orange (MO) as anion dye. The removal efficiency of dyes from contaminated water was investigated during various key parameters at room temperature; initial dye concentration (Co), pH, contact time (t), agitation speed, and adsorbent dosage. The maximum removal of MB dye was found to be 96% (Co=25 mg/l, pH=10, contact time=100 min, agitation speed=300 rpm and adsorbent dosage=6 g/l), while for MO the maximum removal reached 88% at (Co=20 mg/L, pH=2, contact time=160 min, agitation speed=300 rpm and adsorbent dosage=6 g/L). The experimental adsorption data were found to well obey Freundlich isotherm. The kinetic investigation showed that the adsorption process for both dyes followed a pseudo-second-order model with rate constants 0.0109 and 0.0079 (mg/g min) for MB and MO, respectively.
The current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been
In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 fro
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
At the last two decades , The environment has witnessed tremendous changes in many fields with the huge competition , various technological development and customer satisfaction , that are reflected in economic units a doption for lean production system .
Lean Accounting that has appeared as aresponse for changes occurred of economic units adoption for lean accounting system instead of wide production system : through it management of economic units has been changed from management by top departments into management by value flows : has provide new method for accounting costs according to value flow
... Show MoreIn some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreThe searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show More