The emergence of mixed matrix membranes (MMMs) or nanocomposite membranes embedded with inorganic nanoparticles (NPs) has opened up a possibility for developing different polymeric membranes with improved physicochemical properties, mechanical properties and performance for resolving environmental and energy-effective water purification. This paper presents an overview of the effects of different hydrophilic nanomaterials, including mineral nanomaterials (e.g., silicon dioxide (SiO2) and zeolite), metals oxide (e.g., copper oxide (CuO), zirconium dioxide (ZrO2), zinc oxide (ZnO), antimony tin oxide (ATO), iron (III) oxide (Fe2O3) and tungsten oxide (WOX)), two-dimensional transition (e.g., MXene), metal–organic framework (MOFs), c
... Show MoreAbstract:
This research aims to identify the actual reality of the supply chain processes applied in the Noor Al-Kafeel Food Products Company, which was chosen as a research sample by measuring the application and documentation gap. The current research relies on the case study method to reach the desired results, and the seven-scale scale was relied on to identify the reality of the supply chain operations applied in the researched company and the use of quantitative and qualitative methods in data collection and analysis, as quantitative methods such as the arithmetic mean were used weighted, percentage measurement, and g
... Show MoreAbstract
The study aims to identify the common fears of preschool children and their relationship to the approaches to parental treatment in South Al Batinah Governorate from their mother’s point of view. Total of (466) mothers were selected as the study sample. The researcher used the scale of common fear and the scale of parental treatment approaches. The results of the study have shown that the most common fear among the study sample was (the fear of darkness) in the first level with a rate of 75.03%, and in the second level came the item (my child is afraid to sleep alone) by 72.74%, in the third level came to the item (fear of seeing insects) with a rate of 67.59%, and the last one was (the fear of rain) w
... Show MoreNonmissile penetrating spine injury (NMPSI) represents a small percent of spinal cord injuries (SCIs), estimated at 0.8% in Western countries. Regarding the causes, an NMPSI injury caused by a screwdriver is rare. This study reports a case of a retained double-headed screwdriver in a 37-year-old man who sustained a stab injury to the back of the neck, leaving the patient with a C4 Brown-Sequard syndrome (BSS). We discuss the intricacies of the surgical management of such cases with a literature review.
PubMed database was searched by the following combined formula of medical subjects headings,
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreGreen nanotechnology is a thrilling and rising place of technology and generation that braces
the ideas of inexperienced chemistry with ability advantages for sustainability, protection, and
the general protection from the race human. The inexperienced chemistry method introduces a
proper technique for the production, processing, and alertness of much less dangerous chemical
substances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation into
nanomaterials and the resultant bioactivities that pose very few dangerous outcomes for people
and the environment. In the twenty-first century, nanotec
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More