In this work ,glass-metal apparatus was designed and manufactured which used for preparing ahigh purity uranium. The reaction is simply take place between iodine vapour and uranium metal at 500C in closed system to form uranium tetra iodide which is decomposed on hot wire at high temperature around 1100C. Also another apparatus was made from Glass and used for preparing ahigh purity of UI4 more than 99.9% purity.
Alginate is one of the natural biopolymers that is widely used for drug formulations, combination of alginate with other polymers, such as gum acacia, pectin, and carrageenan can increase mechanical strength, therefore, can reduce leakage of the encapsulated active pharmaceutical ingredient from the polymer matrix. Interaction of alginate and these polymers can occur via intermolecular hydrogen bonds causing synergism, which is determined from the viscosity of polymer mixture.
Alginate was combined with gum acacia/pectin/carrageenan in different blending ratios (100:0, 75:25, 50:50, 25:75, and 0:100) with and without addition of CaCl2. The synergism effect is obtained from the design of experimental (DoE), and calculati
... Show MoreStatistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreGenerally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreThe study aimed to design a test of pre-writing skills for public kindergartens in Baghdad city. The test consisted of (25) items applied on a sample of (150) kindergarteners to identify these skills as well as to identify the significant difference between male and female children and if there is a difference between pre-school children and kindergarteners. The results showed the presence of pre-writing skills with a high degree in kindergarten children. The differences were clear in these skills between male and female children and those in pre-school than those in kindergartens. The researcher suggested a number of recommendations and proposals.
Cilnidipine is a dihydropyridine calcium channel blocker used to improve the neurological outcome following subarachnoid hemorrhage. It belongs to BCS class II drugs that have a low oral bioavailability of 13%, thus preparation as nanoparticles would be expected to improve bioavailability. The aim of the study is to prepare Cilnidipine as nanoparticles using different carriers and co-carriers, concentrations, and types. Cilnidipine nanoparticles were prepared by a solvent anti-solvent method using different carriers (Soluplus®, Poloxamer 188, PVA cold) with co-stabilizers (PEG200, glycerol) at different ratios. Based on the obtained results, formula N4, which included Soloplus in a 5:5:1.19 weight ratio of drug to
... Show MoreThe growing demand for sustainable and high-performance asphalt binders has prompted the exploration of waste-derived modifiers. This study investigates the performance enhancement of Natural Asphalt (NA) using Sugarcane Molasses (SM) and Waste Engine Oil (WEO). The modified blends were prepared by partially replacing 50 % NA with varying proportions of SM and WEO ranging from 10 % to 40 % of the total weight of NA. Comprehensive testing was conducted, including penetration, softening point, ductility, viscosity, Bending Beam Rheometer (BBR), Multiple Stress Creep Recovery (MSCR), Energy Dispersive X-ray Spectroscopy (EDX), Fourier Transform Infrared (FTIR) spectroscopy, and Scanning Electron Microscopy (SEM). The results demonstrated that
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More