Many extracted material were used as mouthwash to settle different kinds of oral fungi and bacteria. In this study an extractive of Cyperus rotundus plant E.C.R. which is very active as a mouthwash, was used in concentration range (10-25) ppm in artificial saliva at pH=6.4 and temperature range (288-318) K, to study it’s inhibitory effect on the corrosion of dental amalgam. Potentiostatic and cyclic polarization were used to follow this study. The presence of E.C.R. lead to shift the corrosion potential to the active direction and decreased the corrosion rate to about 98.87%, the inhibition action of E.C.R. resulting from the adsorption of C.R.E. layer between amalgam and saliva as FTIR spectrums shows, where the variety of FTIR adsorption of many group were noticed for the free E.C.R. and adsorbed E.C.R. layer. Thermodynamic of adsorption, corrosion kinetic parameters were also investigated.
In the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char
... Show MoreIn this study, low cost biosorbent ̶inactive biomass (IB) granules (dp=0.433mm) taken from drying beds of Al-Rustomia Wastewater Treatment Plant, Baghdad-Iraq were used for investigating the optimum conditions of Pb(II), Cu(II), and Ni(II) biosorption from aqueous solutions. Various physico-chemical parameters such as initial metal ion concentration (50 to 200 mg/l), equilibrium time (0-180 min), pH (2-9), agitation speed (50-200 rpm), particles size (0.433 mm), and adsorbent dosage (0.05-1 g/100 ml) were studied. Six mathematical models describing the biosorption equilibrium and isotherm constants were tested to find the maximum uptake capacities: Langmuir, Freundlich, Redlich–Peterson, Sips, Khan, and Toth models. The best fit to the P
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreVarious of 2,5- disubstituted 1,3,4-oxadiazole (Schiff base, ?- lactam and azo) were synthesized from 2,5-di (4,4?-amino-1,3,4-oxadiazole which usequently synth-esized from mixture of 4- amino benzoic acid and hydrazine arch of polyphosphorus acid. The synthesized compounds were cherecterized by using some spectral data (UV, FT-IR , and 1H-NMR)
Background: fixed orthodontic appliances deleterious influence on gingival health is well documented. Association between weight status and gingival health is presented in many studies. This study aimed to evaluate how early the impact of fixed orthodontic therapy on patients` gingival health, and if there are differences of that impact among different weight status groups. Materials and Methods: Sample consisted of 54 patients (25 males, 29 females; age limits are 16 -18 years) going under the course of treatment with fixed orthodontic appliance. Patients were categorized according to their Body Mass Index (BMI) into 3 weight status groups considering WHO charts in 2007 (underweight, normal weight, overweight and obese), then determinat
... Show MoreThe main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.
Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi
... Show More