Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series of experiments were conducted at constant mixing speed (300 revolutions per minute) to evaluate the effect of experimental factors likes, adsorption time, pH of diclofenac solution, diclofenac initial concentration, and dosage of activated carbon on removal efficiency. The design of experiments (version 13 Stat-Ease) was implemented using the central composite method to define the optimum effect of the process factors on the removal efficiency. The analysis of variance showed that the quadratic model for the experiment was significant with a very low probability value (P- value < 0.0001). The adjusted R2 of the model was 0.9826 and the predicted R2 was 0.9574. Whereas the optimum conditions suggested by the model for the process variable were found to be 150 min, 3.25 pH, 30 mg/L, 0.267g, for adsorption time, pH of diclofenac solution, diclofenac initial concentration, a dosage of activated carbon, respectively and the maximum removal efficiency was found to be 94.6%. The data obtained from the experiments were fitted with Langmuir and Freundlich models and the results show that the data was well fitted Langmuir model with R2 = 0.9685 as compared to the Freundlich model which has R2 = 0.93249. Likewise, the data was analyzed by pseudo first and second-order kinetic models and the results show that the adsorption on apricot-activated carbon was well adequate with the pseudo-second-order model.
During infection, T. gondii disseminates by the circulatory system and establishes chronic infection in several organs. Almost third of humans, immunosuppressed individuals such as HIV/AIDS patients, cancer patients, and organ transplant recipients are exposed to toxoplasmosis. Therefore, the study aimed to investigate the possibility that Toxoplasma infection could be a risk factor for COVID-19 patients and its possible correlation with C-reactive protein and ferritin. Overall 220 patients referred to the Al Furat General Hospital, Baghdad, Iraq were enrolled from 2020–2021. All serum samples were tested for T. gondii immunoglobulins (IgG and IgM) antibodies, C-reactive protein and ferritin levels. In patients with COVID-19, the results
... Show MoreABSTRACT:
Microencapsulation is used to modify and retard drug release as well as to overcome the unpleasant effect
(gastrointestinal disturbances) which are associated with repeated and overdose of ibuprofen per day.
So that, a newly developed method of microencapsulation was utilized (a modified organic method) through a
modification of aqueous colloidal polymer dispersion method using ethylcellulose and sodium alginate coating materials to
prepare a sustained release ibuprofen microcapsules.
The effect of core : wall ratio on the percent yield and encapsulation efficiency of prepared microcapsules was low, whereas
, the release of drug from prepared microcapsules was affected by core: wall ratio ,proportion of coa
In this paper, we introduce the concept of cubic bipolar-fuzzy ideals with thresholds (α,β),(ω,ϑ) of a semigroup in KU-algebra as a generalization of sets and in short (CBF). Firstly, a (CBF) sub-KU-semigroup with a threshold (α,β),(ω,ϑ) and some results in this notion are achieved. Also, (cubic bipolar fuzzy ideals and cubic bipolar fuzzy k-ideals) with thresholds (α,β),(ω ,ϑ) are defined and some properties of these ideals are given. Relations between a (CBF).sub algebra and-a (CBF) ideal are proved. A few characterizations of a (CBF) k-ideal with thresholds (α, β), (ω,ϑ) are discussed. Finally, we proved that a (CBF) k-ideal and a (CBF) ideal with thresholds (α, β), (ω,ϑ) of a KU-semi group are equivalent relations.
Abstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show MoreThis research aims to determine the extent of the contribution of organizational downsizing strategies to enhance the health of the researched organization represented by the Directorate of Education in Nineveh, and to achieve this goal, the study provided a simplified intellectual framework for the most important topics covered by writers and researchers for search variables, reinforced by an applied analytical framework for the opinions of (79) individuals responsible for the researched organization. The research adopted organizational downsizing as an independent variable that includes three dimensions represented by (reduction of human resources, job redesign, systemic strategy), while the organizational health represented th
... Show MoreAbstract
The current research aims to find out the role of administrative leadership in the implementation of public policies and their effectiveness and their ability to do so, As well as analysis and testing of influence and correlations between research variables, The researcher has the descriptive and analytical approach, And several tools used to gather information consisted of personal interviews and field visits, While distributed questionnaire tool that consists of (35) items on a sample consisting of (147) individuals formed of staff of the Baghdad Provincial Council.
The research was based on a set of assum
... Show MoreObjective :To evaluate elderly's environmental practices concerning fall prevention at governmental elderly care homes in Baghdad city. Methodology: A quazi- Experimental study was carried out in governmental elderly care homes at Baghdad city, during the period 1st, June 2014 to 30th November, 2014 , selected a purposive " Non – probability " sample of (40) elderly men and women aged (60) years old and over who were resident in governmental elderly care homes " Al Ceelakh and Al Sader elderly care homes", the data was collected through the use of constructed questionnaire that consist of (23) items,
Sickle cell disease (SCD) is a hereditary ailment that can cause severe pain and suffering to people who are affected. However, with continued investment in research and treatment options, we can make progress towards improving the lives of those with SCD. Over 40% of patients experience painful vaso-occlusive crises (VOCs), so we must work towards finding solutions and providing support for those living with this condition, These episodes, a hallmark of SCD, significantly contribute to morbidity, mortality, and a diminished quality of life, while also incurring substantial healthcare costs. Chronic pain particularly affects older adolescents and adults with SCD, with over half reporting daily discomfort. Opioid-based analgesics, though sti
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More