this work, a simple method was used to prepare the MnO2 nanoparticles. These nanoparticles then were characterized by several techniques, such as X-ray diffraction, Fourier transform infrared spectroscopy, scanning electron microscopy (SEM) and atomic force microscope (AFM). The results showed that the diffraction peak of MnO2 nanoparticles was similar to that of standard data. The images of AFM and SEM indicated that the MnO2 nanorods were growing from the MnO2 nano spherical shape. PVA-pentaerythritol/MnO2 nanocomposite films were fabricated by evaporating casting method. The dielectric constant and loss tangent of P-Ery/MnO2 films were measured between 10 kHz and 1 MHz using LCR. As the content of MnO2 increased, the dielectric constant decreased from 1.6 to 1.3. The loss tangent of P-Ery was very low at 400 kHz, which increased by an increase in the MnO2 content. Thermogravimetric analysis and Scanning electron microscope methods were used to investigate the thermal stability and surface analysis of the films
This study included a survey and review of the scientific names of the marsh insects (aquatic and surrounding it) for the purpose of unifying and updating the database.
The survey reveals 109 species under 77 genera that belong to 32 families and 7 orders as follow: Coleoptera (44 species), Diptera (7 species) Ephemeroptera (2 species), Hemiptera (14 species), Hymenoptera (11 species), Lepidoptera (2 species) and Odonata with 29 species.
Information of specimens' collection for each species, synonyms and geographical distribution were provided.
In this paper, the delay integral equations in population growth will be described,discussed , studied and transfered this model to integro-differential equation. At last,we will solve this problem by using variational approach.
This paper is an attempt to demonstrate the syntactic behavior of -ly adverbs and -ly adjectives. It mainly deals with -ly as an inflectional suffix that forms adverbs and adjectives It is hypothesized that there are differences between adjective-forming –ly and adverb-forming –ly.The researcher first made general and specific observations about the morphological processes of -ly adverbs and -ly adjectives. Since the study focuses on a linguistic phenomenon, its data is a set of -ly adverbs and -ly adjectives used as examples to support the hypothesis. The importance of studying the syntactic behavior of -ly stems from the fact that thousands of English adjectives and adverbs are created by adding the suffix "-ly" to their roots
... Show MoreAbstract: To study the effect of nickel chloride on bone composition of mice, a number of biophysical and biochemical parameters have been made use. The animals were divided into control and experimental and further subdivided into three groups I, II and III according to the dose of nickel chloride (NiCl2) administered to them i.e. 5.8, 12.8 and 28.2 mg/kg body weight, respectively. Femur bones were obtained by sacrificing the animals three weeks after weaning them once a week. The percentage loss between the wet weight and dry weight of femur in control animals was found to be 32.5+1.5 .In the three experimental groups I,II and III, the percentage loss was 30.4+1.4, 35.3+2.3 and 38.9+2.2 respectively. The percentage loss between the wet we
... Show MoreDifferent solvents (light naphtha, n-heptane, and n-hexane) are used to treat Iraqi Atmospheric oil residue by the deasphalting process. Oil residue from Al-Dura refinery with specific gravity 0.9705, API 14.9, and 0.5 wt. % sulfur content was used. Deasphalting oil (DAO) was examined on a laboratory scale by using solvents with different operation conditions (temperature, concentration of solvent, solvent to oil ratio, and duration time). This study investigates the effects of these parameters on asphaltene yield. The results show that an increase in temperature for all solvents increases the extraction of asphaltene yield. The higher reduction in asphaltene content is obtained with hexane solvent at operating conditions of (90 °C, 4/1
... Show MoreMedia theories and studies have provided many diligences on the concept of social media and the circle of influence, including the theory of social marketing which deals with how to promote ideas espoused by the elite in a society to become a recognized social value. The emergence of social networks provided a revolutionary breakthrough, taking the media to unprecedented horizons; and giving its users great opportunities to influence and move across borders without restrictions and censorship, except in a relatively limited manner.
So, the emergence of social media has created channels of live broadcasting from its audience in a method of development that changes the essence of the known communication theories; a
... Show MoreTerrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More