In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the study of banned pigments, the identification process usually requires only a few indication substances for positive dyes. In general, tattoo pigments are almost insoluble in aqueous solutions, and many organic solvents and various pigment analyses have been conducted. It is proposed that in the future, laboratories concerned with tattoo substance analysis should have access to extensive pigment specifications and spectroscopic databases. The most important and recent physiological side effects of tattooing have been discussed in this review.
The present study aimed to investigate the effects of level pH and the growth phases of Coelastrella saipanensis on Chlorophyll a,b, total, and Carotene. The algae were cultured in BG11 media and grown at different pH levels. We measured chlorophyll a, b, total chlorophyll, growth phases, and carotene concentrations. The results showed that at pH 8.5, the measurements of photosynthetic pigments-chlorophyll a, Chlorophyll b, and the total chlorophyll (0.183, 0.268, and 0.433 mg L-1, respectively). The highest values of chlorophyll a (0.185 mg L-1), and b (0.339 mg L-1), and the total chlorophyll (0.492 mg L-1) were recorded in the stationary phase. In addition, the study found that at pH 8.5 and the beginning of the stationary phase,
... Show MoreThe logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreTrip generation is the first phase in the travel forecasting process. It involves the estimation of the
total number of trips entering or leaving a parcel of land per time period (usually on a daily basis);
as a function of the socioeconomic, locational, and land-use characteristics of the parcel.
The objective of this study is to develop statistical models to predict trips production volumes for a
proper target year. Non-motorized trips are considered in the modeling process. Traditional method
to forecast the trip generation volume according to trip rate, based on family type is proposed in
this study. Families are classified by three characteristics of population social class, income, and
number of vehicle ownersh
This research aims to determine the concentration of radionuclides in dust samples on the public streets of the small side of Diwaniyah city in Iraq as a result of movements of wheels and cars using the gamma spectra and high purity germanium detector (HPGe) with resolution of (2.3 keV) for energy (1.332 MeV) of cobalt 60Co. Dust samples were collected from the streets Diwaniyah city with (26) samples prepared for measurement. The results of the specific activity concentration of Uranium-238, Thorium-232, Potassium-40 and Cesium-137 were (14.66 ± 0.950, 26.29 ± 2.431, 219.04 ± 15.150 and 11.49 ± 0.876) Bq/kg respectively. The radiation parameters Rae
Basketball is a popular game in many parts of the world and many developed countries are making continuous efforts to prepare and develop their emerging players on scientific and clear bases as the basis for reaching high levels The researchers used the descriptive approach in the method of correlative studies to suit the nature of the study The readymade software (IBM SPSS Statistics Version24) was used to perform statistical treatments The researchers concluded that there was a significant relationship between body size indicators (height and weight) with the fitness elements of the emerging basketball players The researchers recommended conducting a similar study to determine the type of relationship to the indicators of the physical str
... Show MoreRheumatoid arthritis (RA) is a systematic autoimmune disorder with chronic inflammation changes of unknown etiology. Various synovial inflammatory and proliferative alterations may contribute to the cartilaginous tissues and invasive bony tissues, leading to destructive joints and malformed bones. This disease is mostly due to infective microorganisms or genetic susceptibility causing immune system disturbances through triggering both T-cells and B-cells. Furthermore, different immune cells may secret cytokines, which are responsible for some RA pathogenesis activity. From ninety individuals, serum sample was collected; thirty of them were normal and sixty cases were patients with RA attended a privet medical clin
... Show MoreThis study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:
1- Increasing the level of availability of study variables inside the companies “The study sample”.
2- There is a correlation between the independent v
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More