In this research, the degradation of Dazomet has been studied by using thermal Fenton process and photo-Fenton processes under UV and lights sun. The optimum values of amounts of the Fenton reagents have been determined (0.07g FeSO4 .7H2O, 3.5µl H2O2) at 25 °C and at pH 7 where the degradation percentages of Dazomet were recorded high. It has been found that solar photo Fenton process was more effective in degradation of Dazomet than photo-Fenton under UV-light and thermal Fenton processes, the percentage of degradation of Dazomet by photo-Fenton under sun light are 88% and 100% at 249 nm and 281 nm respectively, while the percentages of degradation for photo-Fenton under UV-light are 87%, 96% and for thermal Fenton are 70% and 66.8% at 249 nm and 281 nm respectively. In this research the effect of temperature on all the reactions has been studied in the range 25°C-45°C, it has been noticed that the reaction rate constant (k) has increased with increasing temperature, and the best percentage degradation of Dazomet was at 45°C in all processes, so, the thermodynamic functions ?G*, ?H*, ?S* have been calculated
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreObjective(s): To evaluate nurses' knowledge toward pain management of leukemic child in oncology wards
how were receiving chemotherapy.
Methodology: A descriptive study was conducted in two hospitals on (40) nurses, who provided care for the
children with leukemia in oncology wards (2) hospitals (Children Welfare Teaching Hospital and Child’s Central
Teaching Hospital) in Baghdad city from October 2010 up to the 27th of October 2011 for the purpose of
evaluating their knowledge towards pain management for leukemic child. A purposive "non-probability
sample" was selected that consisted of (40) nurse who are working in oncology wards. A questionnaire format
was used which consist of (2) parts, the first part includes
This study was chosen because of the entry of our regions into the seismic zone recently, where Diyala governorate was hit by the Halabja earthquake in 2017 by 7.3Mw. Therefore, the impact of earthquakes will be studied on the AL-Mafraq bridge foundations piles located in Iraq- east of Baghdad in Diyala Governorate and the extent of its resistance to the Halabjah, EL-Centro, and Kobe earthquakes with acceleration 0.1g, 0.34g, and 0.58g respectively. After modeling and performing the analysis by using Midas Gts-Nx software, the settlement (mm) results at nine nodes (four nodes for the pile cap and five nodes for the piles) were obtained for each of Halabjah, EL-Centro, and Kobe earthquakes to know the resistance of the br
... Show MoreBackground: The PMMA polymer denture base materials are low in thermal and strength properties. The aim of the study was to investigate the change in glass transition temperature, E-Moudulus and coefficient of thermal expansion of acrylic denture base material by addition of Al2O3, TiO2 and SiO2nano-fillers in 5% by weight. Materials and methods: The type of polymerization is free radical bulk polymerization. one hundred twenty (120) specimens were prepared , the specimens were divided into four groups according to the material had been added (one control and three for Al2O3, TiO2 and SiO2nanocomposite) each group was subdivided in to three groups according to the test had been done on it, the degree of transition (Tg) was measured by The d
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More