In this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreCurrent research included preparation, characterization of some new chitosan- hydroxy benzaldehyde-Schiff bases with maleic anhydride. The present study aimed to the synthesis and characterization of novel chitosan Schiff base compounds using para- hydroxy benzaldeh and maleic anhydride. The derivative of the schiff-chitosan base, which is associated with different drugs, has been replaced with different amino and hydroxy drugs. The derivative is characterized by different analytical techniques. The results of FT-IR studies clearly indicate construction of the chief amine group in chitosan and the emergence of new bands that correspond to the association of maleic anhydride with the chitosan base. TGA, 1
... Show MoreBackground: The main drawback of soft lining materials was that they debonded from the denture base after a certain period of usage. Therefore, the purpose of this research was to determine the impact of oxygen and argon plasma treatment on the shear bonding strength of soft liners to two different kinds of denture base materials: conventional acrylic resin and high impact acrylic resin. Materials and Methods: Heat cure conventional and high impact acrylic blocks (40 for each group) were prepared. A soft liner connected the final test specimen of two blocks of each acrylic material. Shear bond strength (SBS) was assessed using universal testing machine. Additional blocks were also prepared for analyzing Vickers microhardness, contact ang
... Show MoreIn this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management and decision making. The application of Water Quality Index
(WQI) with sixteen physicochemical water quality parameters was performed to evaluate the quality of Tigris River water for drinking usage. This was done by subjecting the water samples collected from eight stations in Baghdad city during the period 2004-2010 to comprehensive physicochemical analysis. The sixteen physicochemical parameters included: Turbidity, A
Background: The bond strength of endodontic sealers with dentin is a very important property for maintaining the integrity and seal of the root canal filling. The aim of this study was to evaluate and compare the effect of various irrigants (QMix, 17% EDTA and 2.5% NaOCl) on the push-out bond strength of AH plus and Bioceramic sealers. Materials and methods: Forty eight freshly extracted maxillary first molars human teeth with striaght palatal root were used in the study. The collected samples were randomly divided into three groups of equal sample size (n=16), according to the final irrigation regimen as follows: Group (1): QMix 2 in 1, Group (2): 17% ethylenediaminetetraacetic acid, Group (3): 2.5% sodium hypochloride. All samples were
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper