The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive conversion of large farms suitable for growing food to energy production would threaten global food security. In the first ten years of the new millennium, biofuel production increased fivefold, and the largest increase in biofuel production was recorded in 2007-2008, coinciding with a sharp rise in food prices. Compared to the average food prices in the period 2002-2004, the average global prices of cereals, oils and fats traded were 2 to 2.5 times higher in 2008, this continuous increase in the use of food crops to produce biofuels has reflected on global food security. Accordingly, this review article will address previous studies on biofuel production; identify the theoretical framework for the concept of biofuels and its characteristics, and the relationship between biofuels and food security. In this study, we presented biofuels, which are considered one of the important categories in the field of renewable energy and its environmental and economic effects, as well as the experiences of some countries in its production, and the possibility of benefiting from the natural resources available for its production. We will discuss the scientific (chemical) principles of biofuel production.
The aims of research is to know the effect of using the computer in
teaching physics to the fifth secondary grade on the achievement of the students and their retention of information .
The sample consists of ( 50 ) students in the fillh secondary grade (scicnti fie branch ) in Nassiriyah secondary school in Thi-qar governorate in ( 200 I - 2002 ) that chooses as random Iy and divided
to t>vo equivalent groups:control and experimental .
The researcher built the teaching plans of each group . The five lessons choice from curriculum , and desi b'Tl five computer teaching programs , and final achievement test from multip
... Show MoreTwo hundred and ten specimens include urine, blood and ear swab were collected from different hospitals in Baghdad city; 85 (40%) isolates were diagnosed as Proteus spp. with (82%), (11.7%) and (5.8%) represented in urine, blood and ear swab specimens respectively. PCR technique was shown 30 (35.3%) isolates were positive for specific Urease C gene that used in rapid detection of Proteus vulgaris. The ability for chondritinase production was checked invetro and invevo, 24 (80%) isolates of P. vulgaris were showed ablity to chondritinase production and the isolate (p17) has higher enzyme activity value to (175.2U/ml). The Chondroitinase was purified by three short steps only included precipitate with 60% saturated of ammonium sulfate, dia
... Show MoreA single-crystalline semi-polar gallium nitride (11-22) was grown on m-plane (10-10) sapphire substrate by metal organic chemical vapor deposition. Three-step approach was introduced to investigate the grain size evolution for semi-polar (11-22) GaN. Such approach was achieved due to the optimized gallium to ammonia ratio and temperature variations, which led to high quality (11-22) oriented gallium nitride epilayers. The full width at half maximum values along (-1-123) and (1-100) planes for the overgrowth temperature of 1080°C were found to be as low as 0.37° and 0.49°, respectively. This was an indication of the enhanced coalescence and reduction in root mean square roughness as seen by atomic force microscopy. Surface analysi
... Show MoreAn experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.
Leishmania is auxotroph to folic acid,antifolates drug inhibit the synthesis and conversion of folate derivatives. In this study, cytotoxic effect of methotrexate was investigated on the procyclic promastigotes proliferation of L. donovani. The results showed a significant (p ≥ 0.05) difference in growth of treated groups at high concentrations (1000, 500, 250, 125.5) μM after 24, 48 hrs., while at 72 hrs. significant difference was observed at all concentration. The IC50 values was measurable after 24, 48 and 72 hrs. and it was 174.238, 52.283 and 109.175 μM, respectively. The present study showed the cytotoxic effect of methotrexate on the proliferation of promastigotes of the visceral type of Leishmania.
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
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More