The semiempirical (PM3) and DFT quantum mechanical methods were used to investigate the theoretical degradation of Indigo dye. The chemical reactivity of the Indigo dye was evaluated by comparing the potential energy stability of the mean bonds. Seven transition states were suggested and studied to estimate the actually starting step of the degradation reaction. The bond length and bond angle calculations indicate that the best active site in the Indigo dye molecule is at C10=C11. The most possible transition states are examined for all suggested paths of Indigo dye degradation predicated on zero-point energy and imaginary frequency. The first starting step of the reaction mechanism is proposed. The change in enthalpy, Gibbs free energy and change in entropy of the overall reaction are equal to -548268.223 kcal/mol, 30831.951 kcal/mol and 48.552 cal/mol.deg, respectively. The activation energy is 46176.405 kcal/mol. The reaction rate is equal to .
We study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreSGI2 wild type isolate of Sinorhizobium meliloti was isolated from Medicago sativa (alfalfa) plant which was obtained from Al-Tarmiaa region / Baghdad. Nine auxotrophic mutants were obtained from the SGI2 wild type isolate by mutagenesis with Nitrous acid (HNO2). The SGI2 wild type and the all auxotrophic mutant isolates had two Megaplasmids; pSymA and pSymB. No genetic variations in plasmid number and size were detected when gel electrophoresis was done for plasmid profile detection. Genetic variations by using RAPD-PCR technique were obtained between wild type and auxotrophic mutant isolates. One band was detected in SGI6 gel profile with 1.5 Kb size when OPY-04 primer was used. Using OPB7 primer by using RAPD-PCR technique showed larg
... Show MoreBackground: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA
... Show MoreA total of 258 voluntary blood donors (males 101; females 157) in the age range of 18-52 yr among males and 18-55 yr among females were examined for Toxoplasma gondii antibodies (IgG), and (IgM) by immunological technique (Enzyme linked Immunosorbant Assay) during the period from March 2009 to April 2010. This study covered a wide range of factors including immunological, age ,sex , place of residence and symptoms that may have a possible relationship with toxoplasmosis. Results presented in this study showed clearly that 38 (14.7%) of individuals participated in this study having IgG Toxoplasma Ab, among those 10 samples (9.9%) were males and 28 samples (17.8%) were females. Moreover, we found the prevalence of IgM seropositivity in th
... Show MoreBackground: Due to the complicated and time-consuming physiological procedure of bone healing, certain graft materials have been frequently used to enhance the reconstruction of the normal bone architecture. However, owing to the limitations of these graft materials, some pharmaceutical alternatives are considered instead. Chitosan is a biopolymer with many distinguishing characteristics that make it one of the best materials to be used as a drug delivery system for simvastatin. Simvastatin is a cholesterol lowering drug, and an influencer in bone formation process, because it stimulates osteoblasts differentiation, bone morphogenic protein 2, and vascular endothelial growth factor. Objectives: histological, histochemical and histomorp
... Show MoreNon Uniform Illumination biological image often leads to diminish structures and inhomogeneous intensities of the image. Algorithm has been proposed using Morphological Operations different types of structuring elements including (dick, line, square and ball) with the same parameters of (15).To correct the non-uniform illumination and enhancement biological images, the non-uniform background illumination have been removed from image, using (contrast adjustment, histogram equalization and adaptive histogram equalization). The used basic approach to extract the statistical features values from gray level of co-occurrence matrices (GLCM) can show the typical values for features content of biological images that can be in form of shape or sp
... Show MoreThis aim of this study is to assess the Tigris River sediments and utilize them as a new abrasive for the preparation of polished surface of magnetite ore to be studied under reflected light ore microscope. Such polishing process was tested using 250, 125, 71, 45, 25 and 18μm grain sizes of the river sediments. For the completion of the polishing and to obtain a glossy perfect polished surface, the 7 and 2.5 μm sized standard diamond pastes were used. After each polishing stage, the reflectance and roughness of these surfaces were measured as an evaluation step for the polishing efficiency. The reflectance values (R%) of the magnetite surface were found to be reversely proportioned to the abrasive grain size; while the surface roughnes
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreHelicobacter pylori (H. Pylori) is one of the most common infectious human pathogens. H. pylori could induce inflammation, that causes illnesses and disorders of upper gastrointestinal which including peptic ulcer diseases, dyspepsia, gastroesophageal reflux disease and gastric mucosa-associated lymphoid tissue (MALT) lymphoma. It is important to use a better tolerated and greatly effective eradication regimen. In this study, 75 newly diagnosed adult patients with H. pylori infection were included and completed the study, they were allocated into three groups with three different treatment regimens for H. pylori eradications; Group A (25 patients) received oral standard clarithromycin-based tr
... Show More