This research describes a straightforward procedure for extracting the pigment of Methylene Blue (MB) dye from aqueous solutions by utilizing a low-cost, safe, natural, and national source. Batch adsorption experiments were carried out to determine contact time, adsorbent dose, and the starting concentration of the adsorbate. For the analysis, a UV spectrophotometer was employed. Dye adsorption equilibrium was obtained after 120 minutes of contact time. Temkin, Langmuir, and Freundlich isotherm adsorption were used at solution concentrations of (3, 4, 6, and 8) mg/l. Adsorption data is used to predict the pseudo first and pseudo second order kinetic equations, Elovich kinetic models, and intra-particle diffusion using pseudo first and pseudo second order kinetic equations. The Langmuir adsorption model fits the MB adsorption data better than other isotherm models, with the MB capacity at 8 mg/l equal to 0.992 mg/g. The pseudo-second-order model and the adsorption kinetic data are satisfactorily related.
The present study was conducted as atrial to treat secondary hydatidosis in white mice of species Mus musculus. (Balb/c strain), experimentally infected with secondary hydatid cysts of sheep origin. The immunization process was carried by using CF/PS antigen which consist hydatid cyst fluid (CF) antigen, and protoscolices (PS) antigen mixed together and by using two concentrations 7.5, 15 mg/ml. Then derivatives of Benzimidazole, Mebendazole (M) and drugs Albendazole (A) were used 10 and 40 μm/gm body weight respectively. The mixture of drugs was used one week after challenged dose. Criteria taken into consideration to define the activity of the immunization and chemotherapy in this study were reduction in the numeral of cysts, the coeffic
... Show MoreThe current study aimed to detect the effect of gentamicin stress on the expression of hla (encodes hemolysin) and nuc (encodes nuclease) genes of Staphylococcus aureus. Fifty-eight isolates identified as S. aureus were isolated locally from different clinical specimens. Disk diffusion method was used to detect the resistance to S. aureus. The minimum inhibitory concentration (MIC) of gentamicin was estimated by broth microdilution method. hla and nuc genes were determined by polymerase chain reaction technique. The biofilm was evaluated using the microtiter plate method in the presence and absence of gentamicin at sub-MIC. The results showed that 18
... Show MoreObjective: To evaluate whether the SOX2 protein could be used as a predictor in patients with GC and to assessment the correlation between the IHC expression of the SOX2 protein and the various clinic pathological Parameters as age, sex, histopathological subtypes, grade and stage of the tumor by immune-histochemical Technique. This is a retrospective study conducted on 60 randomly selected patients (30) normal versus (30) GC, at the pathology department of the Gastroenterology and Hepatology Teaching Hospital & some private hospitals. It were collected and diagnosed during the period between from 2014 to 2018. From each block were stained with H&E and IHC stained for SOX2. The Statistical analysis was done using SPSS system, and the differ
... Show MoreAfter the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se
... Show MoreModern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreThis paper deals with the estimation of the stress strength reliability for a component which has a strength that is independent on opposite lower and upper bound stresses, when the stresses and strength follow Inverse Kumaraswamy Distribution. D estimation approaches were applied, namely the maximum likelihood, moment, and shrinkage methods. Monte Carlo simulation experiments were performed to compare the estimation methods based on the mean squared error criteria.