The effect of different doping ratio (0.3, 0.5, and 0.7) with thickness in the range 300nmand annealed at different temp.(Ta=RT, 473, 573, 673) K on the electrical conductivity and hall effect measurements of AgInTe2thin film have and been investigated AgAlxIn(1-x) Te2 (AAIT) at RT, using thermal evaporation technique all the films were prepared on glass substrates from the alloy of the compound. Electrical conductivity (σ), the activation energies (Ea1, Ea2), Hall mobility and the carrier concentration are investigated as a function of doping. All films consist of two types of transport mechanisms for free carriers. The activation energy (Ea) decreased whereas electrical conductivity increases with increased doping. Results of Hall Effect Analysis of (AAIT) films show that the kinds of all films were (n-type) and both the carrier concentration and hall mobility increase with increased the doping of the film
Novel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b
... Show MoreThe effects of nutrients and physical conditions on phytase production were investigated with a recently isolated strain of Aspergillus tubingensis SKA under solid state fermentation on wheat bran. The nutrient factors investigated included carbon source, nitrogen source, phosphate source and concentration, metal ions (salts) and the physical parameters investigated included inoculum size, pH, temperature and fermentation duration. Our investigations revealed that optimal productivity of phytase was achieved using wheat bran supplemented with: 1.5% glucose. 0.5% (NH4)2SO4, 0.1% sodium phytate. Additionally, optimal physical conditions were 1 × 105 spore/g substrate, initial pH of 5.0, temperature of fermentation 30˚C and fermentation dura
... Show MoreAbstract
The purpose of our study was to develop Dabigatran Etexilate loaded nanostructured lipid carriers (DE-NLCs) using Glyceryl monostearate and Oleic acid as lipid matrix, and to estimate the potential of the developed delivery system to improve oral absorption of low bioavailability drug, different Oleic acid ratios effect on particle size, zeta potential, entrapment efficiency and loading capacity were studied, the optimized DE-NLCs shows a particle size within the nanorange, the zeta potential (ZP) was 33.81±0.73mV with drug entrapment efficiency (EE%) of 92.42±2.31% and a loading capacity (DL%) of 7.69±0.17%. about 92% of drug was released in 24hr in a controlled manner, the ex-vivo intestinal p
... Show MoreThis study analyses six political cartoons selected based on their relevance to current Iraqi political issues, specifically the period between 2005 and 2015, from American online newspapers (calgecartooms.com). The selection criteria included the cartoons' satirical elements, visual rhetoric, and their ability to engage with themes such as power dynamics, social issues, and public opinion. It sheds light on how these cartoons can function as mediators of meanings between the cartoonists and the readers. The data is examined using multimodal discourse analysis (MDA), which combines language study with the analysis of other visual elements, like colors, gestures, and images, to understand meaning (O’Halloran et al., 2011). The Visual Socia
... Show MoreThe study was carried out to determine the cytotoxic, antioxidant and gastro-protective effect of ethyl-4-[(3,5-di-tert-butyl-2-hydroxybenzylid ene)amino] benzoate (ETHAB) in rats.
In diabetes, impaired wound healing and other tissue abnormalities are considered major concerns. Many factorsaffect the time and quality of wound healing. One of the purposes of medical sciences is wound healing in a short time withreduced side effects. The herbal products are more precious in both prophylaxis as well as curative in delayed diabetic woundhealing activity when compared to synthetic drugs.A wide range of evidence has shown that capers plant possesses differentbiological effects, including antioxidant, anticancer and antibacterial effects. Phytochemical analysis shows thatC. spinosahashigh quantities of bioactive constituents, including polyphenolic compounds, which are responsible for its health-promotingeffects. The healing
... Show MoreGreywater is a possible water source that can be improved for meeting the quality required for irrigation. Treatment of greywater can range from uncomplicated coarse filtration to advanced biological treatment. This article presents a simple design of a small scale greywater treatment plant, which is a series of physical and natural processes including screening, aeration, sedimentation, and filtration using granular activated carbon filter and differentiates its performance with sand filter. The performance of these units with the dual filter media of (activated carbon with sand) in treatment of greywater from Iraqi house in Baghdad city during 2019 and that collected from several points including washbasins, kitchen si
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the