The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning electron spectroscopy (SEM), Energy Dispersive X-ray Spectroscopy (EDS) and Transmission Electron Microscopy (TEM). Under the applied experimental circumstances, the obtained characterization data confirm the synthesis of multi-wall carbon nanotubes (MWCNTs) with portion from few wall carbon nanotubes (FWCNTs). The average diameter of synthesized Carbon nanotubes ranged from 31.26 to 78.00 nm, with a purity of more than 65 percent.
هدف الدراسة معرفة التأثير السمي التراكمي للأعلاف الملوثة بالحنطة المتفحمة على أفراخ فروج اللحم .اجري هذا البحث في مختبرات الصحة الحيوانية التابعة لوزارة العلوم والتكنولوجيا استعمل 78 فرخاً لهذه التجربة قسمت إلى ستة مجاميع ربيت في أقفاص خاصة أعدت لهذا الغرض. تم تغذيتها يوميا على أعلاف ملوثة حسب برامج التغذية المتبعة , تمثلت المجموعة الأولى بمجموعة السيطرة والتي غذيت على عليقه تحوي الحنطة
One of the most frightening to children ages pre-school entry , Are those concerns about natural phenomena such as (The darkness, the sound of thunder, lightning and light, and rainfall, and storms) These natural phenomena are not familiar to the child , It may have a surprise when he/ she sees , And others intimidated , The affects of panic and fears that may lead him some psychological injury symptoms.
The fear of the dark, of the most common concerns associated with the child in his daily life , As the children's fear of the dark is reasonably fear that makes him a natural to live in the unknown , We can not identify what around him and is afraid of something collision, Or injury from somet
... Show MoreAssyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value
The Islamic orthodox caliphs had a great importance in the history of Arabs in
particular, and of Muslims in general.
Some attributed poetry to them. This issue to see whether such an attribution is correct
or not.
This research tried to deal objectively with this poetry .it discussed the topic,
exploring the scholars’ opinions about poetry attributed to the Islamic orthodox
Caliphs, stating their dispute : some of them agreed while others rejected the
attribution.
The research adopted the opinon that had rejected for reasons stated in the
research, of them: the weakness of poetry and its dealing with unimportant things, for
example, the caliph Omar composed verses about a new garment worn by him.
Is it
ملامح من فكرة القانون الطبيعي في حضارة العراق القديم
المستخلص : هدفت البحث الحالي إلى بناء برنامج التدخل المبكر نموذج مجموعة المهارات الاجتماعية الفورد بيكر على وفق أساليب معرفية سلوكية، والتعرف على اثر البرنامج في خفض التوحد الافتراضي لدى الأطفال والتحقق من هذا الهدف وضعت الباحثة الفرضية الآتية لا توجد فروق ذو دلالة إحصائية بين متوسط رتب درجات أفراد المجموعة التجريبية في التطبيقين القبلي والبعدي على المقياس (CARS2-QPC). وقد اقتصر البحث الحالي على الأطفال من ذوي
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
Extraction and Description of Urease Enzyme Produced from Staphylococcus saprophyticus and study of its effect on kidney and bladder of white mice
Polyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show More