Preferred Language
Articles
/
YRb7oIsBVTCNdQwCzdX9
Fate, uptake, and distribution of nanoencapsulated pesticides in soil–earthworm systems and implications for environmental risk assessment
...Show More Authors
Abstract<sec><label></label><p>Nanopesticides are novel plant protection products offering numerous benefits. Because nanoparticles behave differently from dissolved chemicals, the environmental risks of these materials could differ from conventional pesticides. We used soil–earthworm systems to compare the fate and uptake of analytical‐grade bifenthrin to that of bifenthrin in traditional and nanoencapsulated formulations. Apparent sorption coefficients for bifenthrin were up to 3.8 times lower in the nano treatments than in the non‐nano treatments, whereas dissipation half‐lives of the nano treatments were up to 2 times longer. Earthworms in the nano treatments accumulated approximately 50% more bifenthrin than those in the non‐nano treatments. In the non‐nano treatments, most of the accumulated material was found in the earthworm tissue, whereas in the nano treatments, the majority resided in the gut. Evaluation of toxicokinetic modeling approaches showed that models incorporating the release rate of bifenthrin from the nanocapsule and distribution within the earthworm provided the best estimations of uptake from the nano‐formulations. Overall, our findings indicate that the risks of nanopesticides may be different from those of conventional formulations. The modeling presented provides a starting point for assessing risks of these materials but needs to be further developed to better consider the behavior of the nanoencapsulated pesticide within the gut system. <italic>Environ Toxicol Chem</italic> 2018;37:1420–1429. © 2018 SETAC</p></sec>
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Causal Relationship between Forgiveness and Psychological Hardiness For University Students
...Show More Authors

The research aimed to identify the causal relationship between forgiveness and psychological hardness for university students, by answering the following questions: Does forgiveness cause psychological hardiness? Does psychological hardiness cause forgiveness? Is the relationship between the two variables a reciprocal relationship? The research sample consisted of (300) male and female students from the universities of Baghdad and Al-Mustansiriya University. To extract the psychometric properties of the two scales: forgiveness and psychological hardiness, a sample of (50) male and female students employed to repeat the test, making the six connections between the two research variables. To determine the causal relationship, The Pearson c

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
A Prototype and Roadmap for Transition to IPv6 with Performance Evaluation
...Show More Authors

The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
The comparative approach (stabilizer) and the need for Arabic to it
...Show More Authors

Linguistic research according to modern curricula:
   It is one of the important matters that occupy the ideas of those concerned with linguistic studies, whether Arabic or otherwise. Recent years have witnessed the advancement of this methodological approach, and books and studies in Arabic have been written on important, multifaceted issues, of grammatical and linguistic origins, and their balance with new developments and ideas attracted mostly from Western studies.
    The comparative approach - as they call it - is one of the modern approaches that is based on balancing a language with other sisters belonging to its family, to reach similarities and differences between them, and to know the c

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2009
Journal Name
6th.engineering Conference/college Of Eng. /university Of Baghdad
Comparison between analytical solution and experimental results for reinforced loose sand
...Show More Authors

Presents here in the results of comparison between the theoretical equation stated by Huang and Menq and laboratory model tests used to study the bearing capacity of square footing on geogrid-reinforced loose sand by performing model tests. The effects of several parameters were studied in order to study the general behavior of improving the soil by using the geogrid. These parameters include depth of first layer of reinforcement, vertical spacing of reinforcement layers, number of reinforcement layers and types of reinforcement layers The results show that the theoretical equation can be used to estimate the bearing capacity of loose sand.

Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Laminin Is a Promising Predictive Biomarker for Acute and Chronic Toxoplasmosis
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A conceptual Framework For the Relationship between Human and Social Capital
...Show More Authors

Purpose: The research seeks to develop the implications of intellectual human capital, and social capital in business organizations, and will be accomplished on three levels, the first level (the level of description) to identify, diagnose and display content philosophical Strategic Human Resource Management at the thought of modern administrative represented by human capital and Ras social capital. The second level (level of analysis) and the analysis of the extent of the impact of alignment between human capital, and social capital in the organizational strength of the organizations. The third level (Level predict) the formulation of a plan to strengthen the organizational strength in business organizations and to develop speci

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref