Bimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –Pt catalysts supporting TiO2 have been found (0.05g of the catalyst prepared in sol immobilization method, 0.07 g of the synthesised in impregnation procedure. The impact of pH on the degradation reaction was tested; it has been found that pH 10 is the best media for the reaction. The effect of temperature has been discussed when various temperatures were used, and the heat of photoreaction Ea was estimated from the Arrhenius relationship, it has been concluded that the reaction is independent of temperature as the activation energy was very small (Ea= 22 kJ/ mole). The thermodynamic functions; entropy, enthalpy and the free energy have been figured out. It has been found that the positive values of enthalpy ∆H# refer to endothermic reaction, moreover, it has been demonstrated that the photoreaction is an endergonic one according to the calculated values of the free energy of activation. It has been noticed that when temperature increases, it promotes the production of free radicals, but it has been noticed that exceeding the temperature more than the used range causes reducing the percentage of degradation of crystal violet, the reason is due to the limitation conditions of adsorption process at higher temperature on the surface of the catalyst.
Hartha Formation is an overburdened horizon in the X-oilfield which generates a lot of Non-Productive Time (NPT) associated with drilling mud losses. This study has been conducted to investigate the loss events in this formation as well as to provide geological interpretations based on datasets from nine wells in this field of interest. The interpretation was based on different analyses including wireline logs, cuttings descriptions, image logs, and analog data. Seismic and coherency data were also used to formulate the geological interpretations and calibrate that with the loss events of the Hartha Fm.
The results revealed that the upper part of the Hartha Fm. was identified as an interval capable of creating potentia
... Show MoreRecurrent Spontaneous Abortion (RSA) is the most painful experience for couples expecting a child. This study aimed to determine the relevance of IL-2 and IL-6 in recurrent spontaneous abortion (RSA). Serum samples were collected from 90 women attend Al Kadhmiya teaching hospital in Baghdad. 60 women (first group) had recurrent abortion the women were negative for rubella virus, herpes simplex virus and toxplasma gondii. And they were negative from bacterial infection eg. Niesseria gonorrhea and Chlamydia trachomatis. The histopathological tests for fetus abnormalities were negative in this group, and 30 women (second group) with successful pregnancy (normal delivery). All samples we
... Show MoreIn this paper, we introduce the concept of cubic bipolar-fuzzy ideals with thresholds (α,β),(ω,ϑ) of a semigroup in KU-algebra as a generalization of sets and in short (CBF). Firstly, a (CBF) sub-KU-semigroup with a threshold (α,β),(ω,ϑ) and some results in this notion are achieved. Also, (cubic bipolar fuzzy ideals and cubic bipolar fuzzy k-ideals) with thresholds (α,β),(ω ,ϑ) are defined and some properties of these ideals are given. Relations between a (CBF).sub algebra and-a (CBF) ideal are proved. A few characterizations of a (CBF) k-ideal with thresholds (α, β), (ω,ϑ) are discussed. Finally, we proved that a (CBF) k-ideal and a (CBF) ideal with thresholds (α, β), (ω,ϑ) of a KU-semi group are equivalent relations.
Background: Non-small cell lung cancer (NSCLC) is caused of 85% of all lung cancers. Among the most important factors for lung tumor growth and proliferation are the tyrosine kinase receptors that coded by the epidermal growth factor recep-tor (EGFR) gene. Activation of EGFR ultimately leads to developing of lung cancer. The present study was undertaken with an objective to detect EGFR mutations in bronchial wash from Iraqi patients with NSCLC before treatment. Methods: DNA was extracted from bronchial wash samples collected from 50 patients with NSCLC by using a Qiamp DNA Mini Kit (Qiagen, Hilden, Germany). Then, EGFR mutations were determined by using real-time RCR combined with two technologies, Amplification Refractory Mutation System (
... Show MoreThis paper reports the effect of Mg doping on structural and optical properties of ZnO prepared by pulse laser deposition (PLD). The films deposited on glass substrate using Nd:YAG laser (1064 nm) as the light source. The structure and optical properties were characterized by X-ray diffraction (XRD) and transmittance measurements. The films grown have a polycrystalline wurtzite structure and high transmission in the UV-Vis (300-900) nm. The optical energy gap of ZnO:Mg thin films could be controlled between (3.2eV and 3.9eV). The refractive index of ZnO:Mg thin films decreases with Mg doping. The extinction coefficient and the complex dielectric constant were also investigate.
The aim of our study was to investigate the antiviral activity of the Corchorus olitorius family Tiliaceae cultivated in Iraq against measles virus, and to demonstrate an overview about chemical constituents and pharmacological activity of Corchorus olitorius L.
About150 gm Leaves of Corchorus. olitorius were defatted by maceration in hexane for 24 hrs. The defatted plant materials were subjected for extraction after filtration using Soxhlet apparatus, with aqueous methanol 85% as a solvent extraction for 24 hours, the extract was filtered, and the solvent was evaporated under reduced pressure using a rotary evaporator to get a dry extract of about 12 gm. About 4 gm from the residue was suspended in 100
... Show MoreSickle cell disease (SCD) is a hereditary ailment that can cause severe pain and suffering to people who are affected. However, with continued investment in research and treatment options, we can make progress towards improving the lives of those with SCD. Over 40% of patients experience painful vaso-occlusive crises (VOCs), so we must work towards finding solutions and providing support for those living with this condition, These episodes, a hallmark of SCD, significantly contribute to morbidity, mortality, and a diminished quality of life, while also incurring substantial healthcare costs. Chronic pain particularly affects older adolescents and adults with SCD, with over half reporting daily discomfort. Opioid-based analgesics, though sti
... Show MoreBackground: Chronic hyperglycemia causes diabetic nephropathy(DN), which is a typical microvascular complication of type 2 diabetes mellitus. The pathogenesis of DN is not fully understanding. The inflammation may possess a significant role in the progression of DN in diabetic patients. Method: The study accomplished at teaching laboratories of medical city, Baghdad, Iraq. It was included 50uncontrolled diabetic type 2 patients with nephropathy, age range (40-78) years and 42 controlled diabetics type 2 without nephropathy, age range (35 - 52) years as a control group. The participants divided in to two groups according to HbA1c measurement which is described as follows: < 7.5% of HbA1c describes controlled diabetes, and > 9% of HbA1c
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More