The adsorption of cephalexin.H2O from aqueous solution on attapulgite, bentonite and kaolin has been studied at the human body temperature (37.5ËšC) and at 5, 27, 47ËšC in 0.1M hydrochloric acid (pH 1.2). The value of pH 1.2 has been chosen to simulate the pH of stomach fluid. The clays show the following order: Bentonite > attapulgite > kaolin, for their activity to adsorb cephalexin.H2O. The charged clay particles can attract molecules either by electrostatic forces, for the molecules of oppositely charged, or by inducing dipole formation in the neutral molecule. The L-shaped adsorption isotherm indicated that drug molecules arrangement in a flat geometry on the clay surface. The results indicated the applicability of Langmuir isotherm for adsorption of drug on three clays. The amount of cephalexin.H2O adsorbed on the three clays was increased with increasing pH value from 1.2 to 5. At the acidic pH, the competition between cephalexin.H2O molecules and hydronium ions results in a reduction in adsorption process. At fixed temperature and pH, the adsorption of cephalexin.H2O on the three clays was increased with increasing the ionic strength of solution. The data showed a little increase in the amount of drug adsorbed by attapulgite and bentonite with increasing temperature, so the adsorption process appeared endothermic. The reverse was observed with adsorption of cephalexin.H2O on kaolin surface (exothermic).The extent of desorption of cephalexin.H2O from the clays increased when the concentration of drug increased. This result may refer to the difficulty of desorption of the drug at low concentrations, which reflects a relatively higher adsorbate - adsorbent interaction.
Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a simplified capsule formula that can underpin clinically adequate bracket bond strength without jeopardizing the integrity of enamel upon the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare experimental acidic CaP paste. Sixty human premolars were assigned into two groups of 30 each. Enamel conditioning was accomplished using 37% PA-gel for control group and CaP paste for e
... Show MoreVarious simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is
... Show MoreThis systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreThe current study was conducted in the environment of the Martyr Monument Lake in the city center of Baghdad during 2019 to monitor the impact of climatic conditions such as drought, water shortage, high temperatures in the environment of the city and the lack of water flow during the years 2015 to 2018 and their effects on some of the physical and chemical factors of water and the dynamics of the phytoplankton community in the lake environment. Heterogeneity of some studied environmental factors, including air and water temperature, permeability, water depth, pH, DO, BOD5, nutrients, nitrate, NO3, and phosphates were found. The results showed the effect of climate change and the pres
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIt is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid
... Show MoreAbstract
The research aims to identify tax exemptions, their objectives and types, as well as to shed light on the concept of sustainable development, its objectives, dimensions and indicators (economic, social and environmental), as well as to analyze the relationship between tax exemptions and economic development, in addition to measuring and analyzing the impact of tax exemptions on economic development in Iraq for the period ( 2015 - 2021) using the NARDL model. The research problem centers on the fact that failure to employ financial policy tools correctly led to a weakness in achieving economic justice, which leads to a failure to improve social welfar
... Show MoreAbstract
The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently in diagnosing research dimensions and measurem
... Show More