In this work a hybrid composite materials were prepared containing matrix of polymer (polyethylene PE) reinforced by different reinforcing materials (Alumina powder + Carbon black powder CB + Silica powder). The hybrid composite materials prepared are: • H1 = PE + Al2O3 + CB • H2 = PE + CB + SiO2 • H3 = PE + Al2O3 + CB + SiO2 All samples related to electrical tests were prepared by injection molding process. Mechanical tests include compression with different temperatures and different chemical solutions at different immersion times The mechanical experimentations results were in favour of the samples (H3) with an obvious weakness of the samples (H1) and a decrease of these properties with a rise in temperature and the increasing
... Show MoreAn investigation was conducted for the improvement of viscosity index of light lubricating oil fraction (40 stock)
obtained from vacuum distillation unit of lube oil plant of Daura Refinery, using solvent extraction process.
In this study furfural solvent was used to extract the undesirable materials which reduce the viscosity index of raw
lubricating oil fraction.
The studied effecting variables of extraction were extraction temperature range from 70 to 110°C, and solvent to oil
ratio range from 1:1 to 4:1 (wt/wt).
The n-d-M method was used for calculation of carbon distribution and structural group analysis of the raffinate
produced from furfural extraction.
Also the three component phase diagram for a mixed-ba
In this work, chemical and thermal treatment were used to enhance silica extract on the purity of rice husk and to reduce the impurities associated with the extraction of silica. The thermal degradation of rice husk was studied. The characteristics and thermal degradation behavior of rice husk which investigated using thermogravimetric analyzer (TGA). Hydrochloric acid was used to soak the rice husk and the study of leaching influence is followed by XRF tests for samples before and after the combustion process. Acid treatment and combustion method seem to have a clear effect on silica purity. The pyrolysis processes were carried out at Laboratory temperature up to 650 oC in the presence of nitrogen gas flowing at 150 ml/min. The effect o
... Show MoreTo determine the relationship between herpes simplex virus 1, 2 and neurological disorders, sixty samples from patients with neurological diseases were collected (40 patients with Multiple sclerosis and 20 patients with Parkinson’s disease) all of whom attended both the Neurological science Hospital as well as the Neuropathology consultation Department in Baghdad Hospital In Iraq. The samples were collected in the time frame between November 2017 and April 2018. The ages of the patients that were investigated were between (17-76) years and compared to a control group consisting of 25 samples collected from apparently healthy individuals. All the studied groups were subjected to the measurement of anti-HSV 1, 2 IgG antibodies by the means
... Show MoreTo test the effect of 4 levels of nitrogen (i.e. 0, 45, 90 and 135 Kg N ha-1) as urea (46% N) and 3 levels of phosphorus (i.e. 0, 17.5 and 35 Kg P ha-1) as triple superphosphate (21.8% P) on yield and concentration of dill (Anethum graveolens L. local cultivar) seed oil this experiment was carried out during winter season of 1999 - 2000 at the experimental field of Agriculture College, Abu-Ghraib.
Both fertilizers were applied in two equal splits, first at seeds sowing and the second was added one month after emergence. Dried and ground seed samples were subjected to water distillation for extraction of volatile oils
Result indicated that fertilization of dill plants with 90 Kg N
... Show MoreEugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh
... Show MoreBackground: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.
Aim of the study: To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).
Type of the study: a prospective analytic study
Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad
... Show MoreBackground: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More