Non-thermal or cold plasma create many reactive species and charged particles when brought into contact with plant extracts. The major constituents involve reactive oxygen species, reactive nitrogen species and plasma ultra-violets. These species can be used to synthesize biologically important nanoparticles. The current study addressed the effect of the green method-based preparation approach on the volumetric analysis of Zn nanoparticles. Under different operating conditions, the traditional thermal method and the microwave method as well as the plasma generation in dielectric barrier discharge reactor were adopted as a preparation approach in this study. The results generally show that the type of method used plays an important role in determining the size of the zinc particles produced. The traditional and microwave method stimulated the formation of clusters and agglomerates of Zn nanoparticles by effect of temperature parameter. As an example, it was noted that the lowest average diameter was obtained at 50 °C, which was 18.77 nm compared with 30.07, 23, 31, and 25.27 nm in diameter for particles generated with other temperatures of 30, 60, 70, and 80 °C respectively. These formations can occur at relatively low temperature at the expense of the formation of irregular particles. However, the weights of pre-prepared Petroselinum crispum seeds, and the ratio of the extract of P. crispum seeds to the salt, are factors that may play an important role in determining the size of the Zn nanoparticles. The current study has also shown that the highest percentage of generated nanoparticles was obtained with the cold plasma method under moderate operating conditions with the advantage of the economic factor. In addition, the Zn nanoparticles synthesized by cold plasma method in 10 min in all concentrations showed more inhibition effect as antifungal against Candida albicans.
In this research a computational simulation has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev technique had been investigated as mirror trajectory with the aid of Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv
... Show MoreThe research problem has crystallized and in light of these capabilities, the level of performance depends on the application of modern training methods based on actual experimentation, and those methods aim to develop the components of achievement in this competition, including the quantities of exerting the distinctive strength with speed for the arms and feet, which reflects on good skillful performance because the skill of shooting by jumping forward and high forms A major role in achieving goals during the competition that qualifies the team to win, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in some physical abilities, which affects performance and skill level
... Show MoreEconomic performance is one of the most important indicators of economic activity and with the performance of the economy progress varied sources of output and increase economic growth rates and per capita national income, and to recover the business environment and increase investment rates and rising effectiveness of the financial and monetary institutions and credit market. Which leads to increased employment rates and reducing unemployment rates and the elimination of many of the social problems and improve the average per capita income as well as improve the level of national income.
The input / output tables is a technique mathematical indicates economic performance
... Show MoreIn this paper, Bayes estimators of Poisson distribution have been derived by using two loss functions: the squared error loss function and the proposed exponential loss function in this study, based on different priors classified as the two different informative prior distributions represented by erlang and inverse levy prior distributions and non-informative prior for the shape parameter of Poisson distribution. The maximum likelihood estimator (MLE) of the Poisson distribution has also been derived. A simulation study has been fulfilled to compare the accuracy of the Bayes estimates with the corresponding maximum likelihood estimate (MLE) of the Poisson distribution based on the root mean squared error (RMSE) for different cases of the
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
The aim of this study was to get monosodium glutamate (MSG) flavor, which was obtained from glutamic acid, that produced from local isolated from Bacillus subtilis EN3A1-P19U7 which genetically improved, from Bacillus subtilis EN3A1-P19U7, and applied in sausage chicken meat, mayonnaise and vegetable and lentil soup, it has been added MSG product in this study at different concentrations with the use of chicken broth cubes (Maggi) as a commercial flavor for comparison, and it was conducted sensory evaluation of these products and found that the addition of MSG product this study at the level of 0.6% to the sausage chicken and 0.6% to the mayonnaise and 0.15% to the vegetable and lentil soup, the results of sensory evaluation show not signif
... Show More