In this work, a method for the simultaneous spectrophotometric determination of zinc which was precipitated into deionized water that is in a commercial distribution systems PVC pipe, is proposed using UV-VIS Spectrophotometer. The method based on the reaction between the analytes Zn2+ and 2-carboxy-2-hyroxy-5-sulfoformazylbenze (Zincon) at an absorption maximum of 620nm at pH 9-10. This ligand is selective reagent. Since the complex is colored (blue), its stoichiometry can be established using visible spectrometry to measure the absorbance of solutions of known composition. The stoichiometry of the complex was determined by Job’s method and molar ratio method and found to be 1:2 (M: L). A series of synthetic solution containing different
... Show MoreObjective(s): current study aims to find the effect of electronic games on children's behavior, and find the
relationship between child demographic data and the effect of electronic games on the child's behavior.
Methodology: A descriptive-analytic study was conducted for assessing the Effect of electronic games on
children's behaviors that attending to teaching hospitals in Baghdad city during the period of (October/ 20th
/2017 to March/1st /2018). A (50) purposive (non- probabilistic) sample from: Child Protection teaching
Hospital, Child Central Hospital in AL-Iskan. The sample is selected according to the criteria: Children who
visited the consulting unit of children in the hospitals in the first visit, children in
KE Sharquie, AA Noaimi, AG Al-Ghazzi, Journal of Dermatology & Dermatologic Surgery, 2015 - Cited by 19
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
: Porous silicon (n-PS) films can be prepared by photoelectochemical etching (PECE) Silicon chips n - types with 15 (mA /cm2), in15 minutes etching time on the fabrication nano-sized pore arrangement. By using X-ray diffraction measurement and atomic power microscopy characteristics (AFM), PS was investigated. It was also evaluated the crystallites size from (XRD) for the PS nanoscale. The atomic force microscopy confirmed the nano-metric size chemical fictionalization through the electrochemical etching that was shown on the PS surface chemical composition. The atomic power microscopy checks showed the roughness of the silicon surface. It is also notified (TiO2) preparation nano-particles that were prepared by pulse laser eradication in e
... Show MoreThe cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More