In this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati
... Show MoreThis work was conducted to study the oxidation of phenol in aqueous solution using copper based catalyst with zinc as promoter and different carrier, i.e. γ-Alumina and silica. These catalysts were prepared by impregnation method.
The effect of catalyst composition, pH (5.6-9), phenol to catalyst concentration ratio (2-0.5), air feed rate (30-50) ml/s, stirring speed (400-800) rpm, and temperature (80-100) °C were examined in order to find the best conditions for phenol conversion.
The best operating conditions which lead to maximum phenol conversion (73.1%) are : 7.5 pH, 4/6 phenol to catalyst concentration, 40 ml/s air feed rate, 600 rpm stirring speed, and 100 °C reaction temperature. The reaction involved an induction period
Is in this research review of the way minimum absolute deviations values based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.
Large quantities of petroleum-contaminated soil are generated with increased global energy consumption and crude oil production. This theoretical study evaluates the treatment of 1 ton of petroleum-contaminated soil using seven methods: incineration, physical washing, chemical washing, thermal pyrolysis, Fenton-oxidation-pyrolysis, the biological treatment, and asphaltenes. Data were based on experimental results from the Nahran Bin Omar oil lake in Basra Governorate, Iraq, (2019–2021). The methods were compared by waste generation, treatment cost, and duration. Results indicate that using petroleum-contaminated soil as a raw material for asphalt manufacturing is most beneficial since it is sold as a raw material. Incineration is faster a
... Show MoreBackground: Corn Syrup is food syrup higher of carbohydrate, depending on grade. The study aimed to assess efficiency of Corn syrup as cytological fixative.
Subjects and methods: This was laboratory based study, it has been conducted at Elrazi University included apparently 30 healthy students have been involved in this study.
Results: Out of 30 smears fixed with 95% alcohol, 76.7% (n=23) shows excellent nuclear stain, 23.3% (n= 7) shows good nuclear stain. 70% (n=21) show excellent cytoplasmic stain, 26.7% (n=8) shows good cytoplasmic stain, 3.3% (n=1) shows poor cytoplasmuc stain.
Out of 30 smears fixed with corn solution, 60
... Show MoreThe paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement acco
... Show MoreBackground: Vibration decreases the viscosity of composite, making it flow and readily fit the walls of the cavity. This study is initiated to see how this improved adaptation of the composite resin to the cavity walls will affect microleakage using different curing modes
Materials and methods: Standard Class V cavities were prepared on the buccal surface of sixty extracted premolars. Teeth were randomly assigned into two groups (n=30) according to the composite condensation (vibration and conventional) technique, then subdivided into three subgroups (n=10) according to light curing modes (LED-Ramp, LED-Fast and Halogen Continuous modes). Cavities were etched and bonded with Single Bond Universal
... Show MoreThe goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More