This research aimed to examine the effect of concentration of dyes stuff, contact time, temperature and ratio of adsorbent weight in (gm) to volume of solution in (ml) on the percentage removal. Two dyes were used; direct blue 6 and direct yellow and the adsorbent was the maize cob. Batch experiments were performed by contacting different weights of adsorbent with 50 ml of solution of desired concentration with continuous stirring at various temperatures. The percentage of removal was calculated and the maximum percentage of removal was 80%. And as the concentration of solution, contact time, temperature and the ratio of adsorbent to volume of solution increase the percentage of removal increase.
Enzyme activity were studied in the sera of children with leukemia than healthy children, where 31 cases were studied, including 21 cases of patients with acute lymphatic leukemia
Cuneiform texts are the most important sources for our knowledge of ancient history and in all political, economic, social and religious fields, as the ancients left us thousands of these texts, which were found through excavations, and hundreds of these texts were stolen and smuggled out of Iraq, and some of these texts were returned after the Jordanian government confiscated them and returned them to the Iraqi Museum. Most of these cuneiform texts were economic texts. In this research, a group of these confiscated cuneiform texts was studied (their number was six texts bearing the following museum numbers, respectively (160609 - 160103 - 160290 - 160102 - 206650 - 206637) dating back to the time of the king of the Larsa dynasty, Rim-Sin (
... Show MorePublication and edition of two tablets from the library in the Ebabbar Temple of Sippar, a manuscript of the ‘Babylonian Poem of the Righteous Sufferer’ (
Background: This research identified Streptococci spp. depending on culture, biochemistry, the VITEK technique, ability to produce biofilms, and antibiotic resistance. Aim: The goal of this study was to perform microbiological procedures to evaluate the qualitative qualities of mozzarella cheese against infective Streptococci using microbiological care. Methods: Sixty (60) mozzarella cheese samples were brought from diverse markets in Baghdad from October 2023 to December 2023 at the Zoonoses Research Unit and Veterinary Public Health Department, Veterinary Medicine College, University of Baghdad. Culture of samples on agar (MacConkey and blood) and aerobically incubated at 37°C for 48 hours. Gram staining purified colonies to
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More