A simple physical technique was used in this study to create stable and cost-effective copper oxide (CuO) nanoparticles from pure copper metal using the pulsed laser ablation technique. The synthesis of crystalline CuO nanoparticles was confirmed by various analytical techniques such as particle concentration measurement using atomic absorption spectrometry (AAS), field emission scanning electron microscopy (FE-SEM), the energy dispersive X-ray (EDX), and X-ray diffraction (XRD) to determine the crystal size and identify of the crystal structure of the prepared particles. The main characteristic diffraction peaks of the three samples were consistent. The corresponding 2θ is also consistent, and the cytotoxicity of the nanoparticles was
... Show MoreObjectives: acute kidney injury (AKI) is a serious pathophysiology side effect of rhabdomyolysis. Inflammatory mechanisms play a role in the development of rhabdomyolysis-induced AKI. Citronellol (CT) is a naturally occurring monoterpene alcohol (3,7-Dimethyl-6-often-1-ol) found in aromatic plant species' essential oils. In this study, we explored the protective effects of Citronellol on glycerol-induced AKI.
Methods: Four groups of eight mice each (n=8) were formed by randomly dividing the animals into the groups, glycerol-induced AKI model group, low-dose CT-treated group (50mg/kg), high-dose CT-treated group (100mg/kg), and control group. The renal functions of mice from all groups were evalua
... Show MoreThe enhancement of the thermal and thermo-hydraulic performance of a semi-circular solar air collector (SCSAC) is numerically investigated using porous semi-circular obstacles made of metal foam with and without longitudinal porous Y-shaped fins. Two 10 and 40 PPI porous material samples are examined. Three-dimensional models are built to simulate the performance of SCSAC: model (I) with clear air passage; model (II) with only metal foam obstacles, and model (III) with metal foam obstacles as well as porous Y-fins. COMSOL Multiphysics software version 6.2 based on finite element methodology is employed. A conjugate heat transfer with a (k-ε) turbulence model is selected to simulate both heat transfer and fluid flow across the entir
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreThis work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper