Natural Bauxite (BXT) mineral clay was modified with a cationic surfactant (hexadecy ltrimethy lammonium bromide (BXT-HDTMA)) and characterized with different techniques: FTIR spectroscopy, X-ray powder diffraction (XRD) and scanning electron microscopy (SEM). The modified and natural bauxite (BXT) were used as adsorbents for the adsorption of 4- Chlorophenol (4-CP) from aqueous solutions. The adsorption study was carried out at different conditions and parameters: contact time, pH value, adsorbent dosage and ionic strength. The adsorption kinetic (described by a pseudo-first order and a pseudo-second order), equilibrium experimental data (analyzed by Langmuir, Freundlich and Temkin isotherm models) and thermodynamic parameters (change in standard free energy) (ΔG°), standard enthalpy (ΔH°), and standard entropy (ΔS°)) were investigated and determined. Beside the advantages and properties of BXT-HDTMA (effective and low-cost adsorbent), the adsorption study revealed that the modification of natural bauxite (BXT) with hexadecy ltrimethy lammonium bromide has enhanced its adsorption capacity (eight to ten times greater comparison with the natural Bauxite).
Background/Aim There is an association between patient general health, socioeconomic status and fracture incidence. Aim of this study was to demonstrate the relation between the socioeconomic and health status and the occurrence of fractures in Al-Kindy Hospital residents. Methods A prospective cross-sectional study was performed by using data collected from fractured patients in Al-Kindy Teaching Hospital / Baghdad Orthopaedics Outpatient Clinic, between 12 December 2021 and 8 March 2022. A hundred patients aged 20 to 75 years were included in this study. The data were collected using a researcher-administered questionnaire, which included items to assess patient's socioeconomic status (accommodations, occupation, income status, level of e
... Show MoreThe contractual imbalance is perceived today by the majority of the doctrine as being one of the pitfalls to the execution of the contracts. As a result, most legislations grant judges the power to intervene to restore it. Granting the judge the power to complete the contract raises the question of the extent to which the judge can obtain such power. Is it an absolute authority that is not limited? If so, is it a broad discretion in which the judge operates in his conscience, or is it a power of limited scope by specific legal texts and conventions? This is what we will try to answer in this research.
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
(Sb2S3)1-xSnx thin films with different concentrations (0, 0.05 and
0.15) and thicknesses (300,500 and 700nm) have been deposited by
single source vacuum thermal evaporation onto glass substrates at
ambient temperature to study the effect of tin content, thickness and
on its structural morphology, and electrical properties. AFM study
revealed that microstructure parameters such as crystallite size, and
roughness found to depend upon deposition conditions. The DC
conductivity of the vacuum evaporated (Sb2S3)1-x Snx thin films was
measured in the temperature range (293-473)K and was found to
increase on order of magnitude with
A total of 228 domestic and wild animals, including sheep, goats, cows, buffaloes, camels, horses, donkeys, dogs, cats, wild hares, Asiatic jackals, and red foxes were examined for ixodid ticks in the central region of Iraq. Nine species of ixodid ticks belong to two genera namely Hyalomma anatolicum Koch, 1844, H. excavatum Koch, 1844, H. turanicum Pomerantsef, 1946, H. scupense Delpy, 1946, H. dromedarii Koch, 1844, H. schulzei Olenev, 1931, Rhipicephalus annulatus (Say, 1821), R. turanicus Pomerantsef & al., 1940 and R. leporis Pomerantsef, 1946 were recovered. Their distribution among hosts and infestation rates were di
... Show MoreBackground: The antimicrobial resistance is one of the most serious and expanding health problems world -wide in the last decades. The esbl escherichia coli. (extended – spectrum beta-lactamase e.coli) represents an important aspect of it .Objectives: To get an overview on the esbl e.coli prevalence profile in general. Also to assess the antibiotic sensitivity of esbl e. coli trying to specify the most effective antibiotics in combating this micro-organism.Methods: this study tries to focus on this problem in Iraq which through a prospective study approach by taking 35 clinical samples from various sources (urine, blood, abscess, eye ,vagina ,stool and others),and after confirming the presence of e.coli, the presence of esbl e.coli and
... Show MoreThe synthesis, characterization and liquid crystalline properties of N4,N40 -bis((1 H-benzo[d]imidazol-2- yl)methyl)-3,30 -dimethyl-[1,10 -biphenyl]-4,40 -diamine and of their corresponding Mn(II), Fe(II), Ni (II), Cu(II), and Zn(II) complexes are described. The ligand and complexes have been characterized by elemental analysis, magnetic susceptibility measurements (meff), conductometric measurements and Fourier Transform Infrared (FTIR), Nuclear Magnetic Resonance (1 H NMR), (13C-NMR) and UV–Vis spectroscopy. Spectral investigations suggested octahedral coordination geometrical arrangement for M(II) complexes. The phase transition temperatures were detected by differential scanning calorimetry (DSC) analysis and the phases are confirmed
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreThis study aimed to investigate the impacts of the Trigonella foenum-graecum (T. foenum-graecum) seeds on the female gonad. A total of twenty local rabbits were used in this study; were divided into four groups (5 each): first group (G1) was considered as the control group. The second group (G2), third group (G3) and fourth group (G4) were fed daily1.5%, 3%, and 4.5% of T. foenum-graecum seeds respectively for 60 days (twice daily). At the end of the experiment, the animals were euthanized by diethyl ether (C2H52O). Then the abdomen was incised, and the samples of ovaries were collected and fixed by 10% neutral buffered formalin. The histological assessment was done with a paraffin embedding technique and the histological sections w
... Show More