Formation of Au–Ag–Cu ternary alloy nanoparticles (NPs) is of particular interest because this trimetallic system have miscible (Au–Ag and Au–Cu) and immiscible (Ag– Cu) system. So there is a possibility of phase segregation in this ternary system. At this challenge it was present attempts synthetic technique to generate such trimetallic alloy nanoparticles by exploding wire technique. The importance of preparing nanoparticles alloys in distilled water and in this technique makes the possibility of obtaining nanoparticles free of any additional chemical substance and makes it possible to be used in the treatment of cancer or diseases resulting from bacterial or virus with least toxic. In this work, three metals alloys Au-Ag-Cu nanoparticles (A, B, and C) were prepared by exploding wire with different ratio of each elements. A high purity wire with diameters (0.3mm) against plate of these alloys were held at 20V with respect to the wire achieving different currents of 75, 100 and 160 A in distilled water and then the size and a shape of the synthesized alloy nanoparticles modify by pulse laser with different energies, where the colloids of nanoparticles were exposed to one thousand pulses of 532 nm wavelengths per pulse from second harmonic Nd-YAG laser, after it has been focused by a lens with 15 cm focal length. The structural properties were studied using x-ray diffraction. It was found that alloy nanoparticles with crystalline structure identical with face center cubic (fcc) and there is a new phase was appear for the A alloy this phase have the name tetragonal AuCu. It can be concludes that electrical explosion wire in liquid medium (EEW) is promising technique for preparation metal alloy Au-Ag-Cu nanoparticles.
Hellenistic architecture represents an important example of the reflection of ancient Greek architecture in the art of oriental architecture in the countries of the ancient world, including those states spread across North Africa that were under the authority of the Ptolemies and who were able to transmit those artistic values and traditions of Greek architecture to those regions. The current research deals with a detailed study of those important transformations of civil and religious architecture, as well as the most important features of that architecture through the constituents of location and geographical location.
Swarming is one of the most important virulence factors used by bacteria to invade new sites. This study aimed to test the effects of gentamicin on swarming motility of Pseudomonas aeruginosa, both phenotypically and molecularly. The present results revealed that 11/25 isolates had gentamicin MIC of 1024 µg/ml. However, gentamicin at sub-minimal inhibitory concentration significantly (P< 0.05) reduced the diameter of swarming in all P. aeruginosa isolates. Noticeably the mean and median swarming diameter before treatment with gentamicin 5.557 and 5.816 cm respectively had significantly (P < 0.001) reduced to 0.871 and 0.766 cm respectively. At the molecular level, amrZ (a global regulator of multiple genes) and
... Show MoreBreast cancer (BC) is the most prevalent tract cancer in the world, including Iraq. The classified breast tumors to benign, malignant, and radiotherapy. Cancer treatment depends on certain stages such as mastectomy then chemotherapy alone or with radiation therapy or endocrine therapy according to the prognostic features obtained from the pathology report. The present study included 100 females. The women were split into two groups, control group that consisted of 50 apparently healthy females and 50 patients with BC group who undergo the radiotherapy. The current study highlighted on some of the anthropometric measurements, including the oxidative stress index malondialdehyde (MDA), the concentrations of total antioxidant capacity (TAC), s
... Show MoreObjectives: to compare health of mothers and neonatal among age groups, to find out the correlation between
age groups and mother and neonatal health.
Methodology: A descriptive study was carried out at delivery rooms of three teaching hospitals in Baghdad city
from Feb. 28th through May. 28th
, 2013. A purposive (non-probability) sample of 300 laboring women was selected
from delivery rooms categorized into three groups, group 1 (≤19) years, group 2 their age between (20-35) years
old and group 3 their age (≥35) years. The data were collected through the use of constructing questionnaire, an
interview technique with mothers and reviewing their medical records as means of data collection; The
questionnaire con
Gas lift is one of the artificial lift techniques which it is frequently implemented to raise oil production. Conventionally, the oil wells produce depending on the energy of reservoir pressure and solution gas which declines due to continuous production. Therefore, many oil wells after a certain production time become unable to lift oil to the surface. Thus, the continuity of production requires implementation of gas lift which works to decrease the average fluid density in the tubing by injection gas through the annulus into the tubing. This paper aims to get maximum oil production of an Iraqi giant oil field at optimum injected gas rate. The field is located in south of Iraq and in
The article attempts to provide the theoretical fundamentals for the semiotic component of lacunae in a language. The definitions of the following notions have been represented: 1) lacunarity as a complex phenomenon that works in the modes of language, speech and speech behaviour; 2) lacuna as a gap, an empty space, which lacks something, which may be characteristic of a written work. The author of the article considers the main classes of lacunae, among which are: 1) generic lacunae, which reflect the absence of a common name for a class of objects; 2) species lacunae are the absence of specific names, names of individual types of objects or phenomena; 3) intralingual lacunae are found within the paradigms of one language; 4) interlanguage
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More