In the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show that the mass parabolas of isobar elements with an even mass number (A=even) vary from the mass parabolas of isobar elements with an odd mass number (A=odd), In the case of single isobars, it has one parabola, meaning that it has one stable isobar, while we find that the pairs isobars appear to have two parabolas, meaning that it has more than one stable isobar. When we compared the two methods used in this study to determine the most stable isobars, we found that in two techniques for odd isobars, stable isobars are mostly the same nuclide, whereas in suitcases of even isobars with two stable isobars (only one of them are same stable isobars).
Many studied were conducted to evaluate the antihepatotoxic and antioxidant activities of Silybum marianum and proved these actions. The Naturally grown seed in Iraqi-Kurdistan Region also were studied for its chemical contents and biological activities. Vegetable oils occur in various plant parts mainly concentrated in the seeds.
In this study comparison was made between the fatty acid patterns of two plant seeds, Silybum marianum and Nigella sativa. Seed sample of Silybum marianum and Nigella sativa were exposed for extraction and isolation of the fatty acid contents using two different solvents (petroleum ether and n-hexane) at 60-80oC using soxhlet apparatus and the oily extract
... Show MoreBackground : Shoulder pain is a common problem that can pose difficult diagnostic and therapeutic challenges for the family physician It is the third most common musculoskeletal complaint in the general population, and account for 5% of all general practitioners musculoskeletal consults Objective: To determine the diagnostic performance of ultrasonography compared with the physical examination for detection of rotator cuff tears in painful shoulder syndrome. Method: Prospective study was done on seventy patients (48 male, 22 female), age ranged between 30-70 years (mean age 50 years), From February 2007 to July 2011, were subjected to comparative study in Al-Kindy teaching hospital with rotator cuff tears, including physical and ultrasonogr
... Show MoreThis study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this
... Show MoreThe current study includes 144 samples were 106 bacterial samples belonging to the clinical sources, 38 bacterial samples belonging to the environmental sources to investigate the presence of bacteria P. aeruginosa. The results of diagnosis clarified that there are 45 bacterial isolates belonging to the bacterium P. aeruginosa The examination of the sensitivity of all bacterial isolates was done for elected 45 isolation towards the 11 antibiotic by spread method on the dishes. The results showed that the resistance ratio toward Cefixim, Cefotaxim, Tetracycline, Amoxicillin, Cloxacillin, Methicillin, Erythromycin and Naldixic acid was 77.7, 73.3, 84.4, 82.2, 80, 77.7, 77.7 and 73.3 respectively, While most isolates were sensitive to all o
... Show MoreThis work was conducted to determine the volumetric mass transfer coefficient (Ky.a) infixed bed adsorption using hexane-benzene mixture by adsorption onto a fixed bed of white silica gel. Benzene concentration was measured by gas chromatography. The effect of feed flow rate and initial concentration of benzene in hexane-benzene mixture on the volumetric mass transfer coefficient and on the adsorption capacity of silica gel was investigated.
In general, the volumetric mass transfer coefficient increases with increasing hexane flow rate, and with increasing initial concentration of benzene in the mixture. The ultimate value of (Ky.a) was at 53 ml/min of hexane flow rate with benzene initial concentration of (6.53 wt. %), and it wa
... Show MoreBackground: Non-alcoholic fatty liver disease (NAFLD) is the most common liver disorder globally. The prevalence is 25% worldwide, distributed widely in different populations and regions. The highest rates are reported for the Middle East (32%). Due to modern lifestyles and diet, there has been a persistent increase in the number of NAFLD patients. This increase occurred at the same time where there were also increases in the number of people considered being obese all over the world. By analyzing fatty liver risk factors, studies found that body mass index, one of the most classical epidemiological indexes assessing obesity, was associated with the risk of fatty liver.
Objectives: To assess age, sex, and body
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More