تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت دراسة عدة عوامل تشغيلية بدرجة حرارة الغرفة لمعرفة تأثيرها على كفاءة الامتزاز. تشمل هذه العوامل التركيز الأولي لـ CIP الممتز، ومستوى الرقم الهيدروجيني، وزمن الامتزاز، وكمية المادة المازة. تم اختبار خصائص الكربون المنشط باستخدام التحليل الطيفي للأشعة تحت الحمراء (FTIR)، والمجهر الماسح الإلكتروني (SEM)، وحيود الأشعة السينية (XRD)، وحساب المساحة السطحية والحجم المسامي بطريقة (BET). تمت دراسة نمط الامتزاز وتبين بان نموذج Langmuir هو الموديل المناسب لعملية امتزاز CIP على الكربون المنشط بالشاي .(TAC)يتمتع الكربون المنشط المنتج بالقدرة على امتصاص السيبروفلوكساسين، بقدرة امتصاص قصوى تبلغ 256.41 ملغم/غرام. تمت دراسة حركية الامتزاز وتبين انه يمكن تمثيلها بتفاعل من الدرجة الثانية.
Anastrozole (ANZ) is considered constitute of the fourth –generation of Non–steroidal aromatase blockage, ANZ has use for hormone receptor positive breast cancer in postmenopausal women. The serious side effects of ANZ including, vaginal dryness, hot flashes, irritability, breast tenderness and un–stability in circulation.
Nanostructured lipid carriers (NLCs) have recently emerged as a multifunctional platform for drug delivery in cancer therapy.
Five formula were composed of (200 mg of glyceryl monostearate, 40 mg of oleic acid , 1% (w/w) Tween 80, 1% (w/w) Poloxamer 407, 1% (w/w) soy lecithin and Vitamin E Polyethylene Glycol Succinate.
The mean particle size, polydispersity index, zeta potential, entrapme
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreBACKGROUND: Preeclampsia (PE) is a possible etiology of obstetrical and neonatal complications which are increased in resource-limited settings and developing countries. AIM: We aimed to find out the prevalence of PE in Iraqi ladies and specific outcomes, including gestational weight gain (GWG), cesarean section (CS), preterm delivery (PD), and low birth weight (LBW). METHODS: All singleton pregnant women visiting our tertiary center for delivery were involved over 3 years. PE women were compared with non-PE ladies. Complete history and examination were done during pregnancy and after delivery by the attending obstetrician and neonatologist with full documentation in medical records. RESULTS: PE prevalence was 4.79
... Show MoreThe proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue
... Show MoreRheumatoid arthritis (RA) is a systematic autoimmune disorder with chronic inflammation changes of unknown etiology. Various synovial inflammatory and proliferative alterations may contribute to the cartilaginous tissues and invasive bony tissues, leading to destructive joints and malformed bones. This disease is mostly due to infective microorganisms or genetic susceptibility causing immune system disturbances through triggering both T-cells and B-cells. Furthermore, different immune cells may secret cytokines, which are responsible for some RA pathogenesis activity. From ninety individuals, serum sample was collected; thirty of them were normal and sixty cases were patients with RA attended a privet medical clin
... Show MoreMercury is a heavy metal that is extremely toxic. There are three types of it: inorganic, organic, and elemental. Mercury in all its forms has been shown to have harmful effects on living things. It can multiply its concentration from lower to higher trophic levels and accumulate in the body's various tissues. Aquatic organisms bodies have been exposed to mercury mostly through various human activities. The largest source of mercury pollution in the air is thermal power plants that mostly use coal as fuel. It is carried to a body of water after being deposited on the ground surface from the air. The way it enters the food chain is through aquatic plants and animals. Mercury accumulations in the kidney, liver, gills, or gonadal tissu
... Show MoreMorphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show More