Pharmaceuticals are widely distributed in different applications and also released into the environment. Adsorption of Ciprofloxacin HCl (CIPH) on Porcelinaite was studied at ambient conditions. The adsorption isotherms can be well described using the Freundlich and Temkin equations. The pH of the solution influences significantly the adsorption capacity of Porcelinaite, the adsorption of CIPH increased from the initial pH 1.3 and then decreased over the pH rang of 3.8-9. The adsorption is sensitive to the change in ionic Strength, which indicate that electrostatic attraction is a significant mechanism for sorption process. The enthalpy change (∆H) for the adsorption of CIPH onto Porcelinaite signifies an endothermic adsorption. The ∆G value is negative at all studied temperatures, inferring that, the adsorption of CIPH onto porcelinaite will follow a spontaneous trend. The ∆G value decreased when the temperature increased from 15 oC to 37.5 oC, suggesting increase in adsorption of CIPH with increasing temperature. The positive value of ∆S reflects the affinity of porcelinaite towards drug and also suggests increased randomness at the solid-solution interface.
The purpose of the current research is to investigate the impact of cooperative learning elements upon Iraqi EFL Academic learners` Educational outcomes in Syntactic proficiency. The hypothesis of current research is that there are no statistically significant differences between the mean score of experimental groups that used Kagan’s PIES (Positive reliance, Individual Accountability, equivalent cooperation, Simultaneous Interaction) and the control group that followed conventional method. In this study, the sample of the study is (30) university ESP learners were involved at college of Education. The control group (15) students were taught in conventional teaching whereas other (15) learners in experimental groups exposed to Kagan’s P
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn light of the limited sources of funding suffered by the Iraqi economy, it highlights the importance of enhancing the efficiency of public expenditure, and if the measurement of the efficiency of public expenditure and identify benchmarks first step of promoting efficiency, the adoption of scientific methods of analysis imperative in promoting the efficiency. Under this framework, the focus was on the methodologies used to measure the efficiency of public spending and supply analysis with trying statement strengths and weaknesses, and make use of it in the measurement of the efficiency of public spending in the Iraqi economy. As well as devise measurable indicators take into account the specificity of the Iraqi economy and the
... Show MoreThis research analyzes the level of the short circuit effect of the Iraqi super network and decides the suitable location for the High Voltage Direct Current (HVDC) connections in order to obtain the best short circuit reduction of the total currents of the buses in the network. The proposed method depends on choosing the transmission lines for Alternating current (AC) system that suffers from high Short Circuit Levels (SCLs) in order to reduce its impact on the transmission system and on the lines adjacent to it and this after replacing the alternating current (AC) line by direct current (DC) line. In this paper, Power System Simulator for Engineering (PSS/E) is used to model two types of HVDC lines in an effective regi
... Show MoreMultiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. These di
... Show MoreObjective This study aimed to compare the biomechanics of three-point shooting between elite Iraqi basketball players and international players, in order to identify key biomechanical differences that may impact shooting performance. Methods A total of 80 male basketball players participated in the study (40 elite Iraqi players and 40 international elite players). Kinematic data were collected using advanced motion analysis systems, force plates, and high-speed video analysis. The measured variables included joint angles, angular velocity, release speed, ball release angle, and ground reaction forces during three-point shooting. Each player performed 20 consecutive shots under controlled conditions. Group comparisons were conducted using st
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja