In this paper, the path of the extracted and focused ions by the electrostatic lense having three electrodes of the same size and shape have been studied. However, the first and third electrodes had a different potential from the second electrode and the distance between any three electrodes was (d).The beams of the charged particles were controlled by using electrostatic fields which are used for accelerating and focusing. This paper focuses also on the effect of electrodes potentials on ion beam focusing. It is found that the best focusing was achieved when the values of the potential of the first and third electrode are equal to half of the value of the second electrode. Concerning transmiting and acumulating the ions beams, the study shows that these beams stayed fixed and steady when their paths were doubled, without any change in extracted beam density. This method is called Plasma Portation.
Abstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More
For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design
... Show MoreBackground: In spite of all efforts, Non-small cell lung cancer (NSCLC) is a fatal solid tumor with a poor prognosis as of its high metastasis and resistance to present treatments. Tyrosine kinase inhibitors (TKI) such as erlotinib are efficient in treating NSCLC but the emergence of chemoresistance and adverse effects substantially limits their single use. Objective: in this study, the combination treatments of either 2-deoxy-D-glucose (2DG) or cinnamic acid (CINN) with erlotinib (ERL) were tested for their possible synergistic effect on the proliferation and migration capacity of NSCLC cells. Methods: In this study, NSCLC model cell line A549 was used to investigate the effects of single compounds and their combination on cell gro
... Show MoreThe environmental surfaces hygiene of college premises like classrooms play role in spreading different pathogenic bacteria, furthermore a Medical students are often potential vectors for resistant bacteria to their entourage. This study aimed to assess bacterial contamination and their susceptibility to various antimicrobial agents in the educational classroom of Al-Kindy College of medicine in two classrooms: one occupied by clinical visitor and non-clinical visitor students to evaluate and determine its health risk. In this cross-sectional study, different sites of the educational classroom of Al-Kindy College of medicine were studied. Ninety-sex Different swab samples were collected from 8 different sites of college across bot
... Show MoreThis research is a case study to solve control problems in Al Rasheed edible oil factory fire tube boilers. they have hopes to develop a new control system to manage boilers operation. The suggestion is to use Zelio soft programmable relays instead of the unavailable old control units. Operation philosophy was studied through works of literature, operation manuals, and standards. Programmable logic control relay is proposed as an advanced selection than PLC's. Boilers operation is accompanied by operation risks. many boilers were exploded in Iraq for different reasons. Some problems are attributed to manual operation mistakes. Extensive work was done to understand the operation sequence, emergency shutdown, and faults causing the trips. A c
... Show MoreThis research aims to understand the mineralogical and geochemical characteristics of the nickel laterite deposit in the East Sulawesi Ophiolite Belt in Wiwirano District, North Konawe, Southeast Sulawesi, Indonesia. The deposit is analyzed and described to determine the laterization process and supergene enrichment. The geochemical data was obtained from X-ray fluorescence analysis, and mineralogical data from petrography and X-ray diffraction analysis. The minerals in the limonite zone are dominated by goethite and hematite. Minerals found in the saprolite zone include quartz, orthopyroxene, and lizardite, whereas the bedrock is made up of olivine, orthopyroxene, serpentine, and chromite. Fe2O3, Al2O3, and Co contents are high in
... Show MoreObjective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as
... Show MoreThis research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreSince its first description as a cytotoxic agent, Olea europaea leaves extract gained significant popularity against human breast cancer, ethyl acetate extract of Olea europaea leaves obtained by acid hydrolysis method was evaluated in vitro as cytotoxic agent against new human breast cancer (AMJ13) cell line, using the MTT assay. One main pentacyclic triterpenoid; oleanolic acid, was isolated from leaves of Olea europaea by well-known two different methods, but not used for this compound before, the acidic hydrolysis method and basic acidic method. The presence of oleanolic acid was proved in both methods with qualitative and quantitative d
... Show More