A revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem of study, the researchers concluded that it is necessary to use computers in reengineering the budget of balance sheet to save time and effort of preparation.
In this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental
Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases ou
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThe study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
This research was aimed to study the exposure of Razzazah Lake to major hydrological changes in recent years as a result of natural climatic changes and drought, high evaporation in lake due to stop discharge from Habbaniyah Lake by Al- majera channel. During 2019, we collected surface water samples at three locations, and three samples from groundwater, in addition one samples from each location Imam Ali Drop and Sewage water of Karbala. The Results show that the heavy isotopes in lake and groundwater well are enriched during the warm period, and depleted during the cold period. Chemically, The dominant cations and anions in Al-Razzaza lake water are mainly of in Order Ca > Na > Mg and Cl>SO4 and the water
... Show MoreRelease of industrial effluents comprising dyes in water bodies is one of the foremost causes of water pollution. Therefore, the proper and proficient treatment of these dyes contaminated left-over material before their release is crucial. Herein, an eco-friendly biological macromolecule Gum-Acacia (GA) integrated Fe3O4 nanoparticles composite hydrogel was manufactured via co-precipitation technique for effective adsorption of Congo red (CR) dye existing in water bodies. The as-prepared magnetic GA/Fe3O4 composite hydrogel was characterized by FTIR, XRD, EDX, VSM, SEM, and BET techniques. These studies discovered the fruitful fabrication of biodegradable magnetic GA/Fe3O4 composite hydrogel possessing porous structure with large surface are
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More