Adsorption studies were carried out to test the ability of the Iraqi rice bran (Amber type) to adsorb some metals divalent cations (Cd2+, Co2+, Cu2+, Fe2+, Ni2+, Pb2+, and Zn2+) as an alternative tool to remove these pollutants from water. The Concentrations of these ions in water were measured using flame and flamless atomic absorption spectrophotometry techniques. The applicability of the adsorption isotherm on Langmuir or Freundlisch equation were tested and found to be dependent on the type of ions. The results showed different adsorptive behavior and different capacities of the adsorption of the ions on the surface of the bran. The correlation between the amounts adsorbed and different cation parameters including (electronegativity, ionic radius, and the second ionization potential) were tested. This study showed the applicability of bran, as a cheap and available waste materials, to remove different cations from solution.
Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a simplified capsule formula that can underpin clinically adequate bracket bond strength without jeopardizing the integrity of enamel upon the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare experimental acidic CaP paste. Sixty human premolars were assigned into two groups of 30 each. Enamel conditioning was accomplished using 37% PA-gel for control group and CaP paste for e
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThe paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.
We demonstrate that the selective hydrogenation of acetylene depends on energy profile of the partial and full hydrogenation routes and the thermodynamic stability of adsorbed C2H2 in comparison to C2H4.
ABSTRACT
The research aims to analyze the value chain of dairy products in Iraq (Abu Ghraib/Study Case) factories for the year 2022, where value chain rings are identified to discuss and track the most important determinants and problems in the value chain rings of dairy products and their basic and secondary activities, as well as calculate the value added of the products by subtracting the total revenues of products from their variable costs. Research data were collected for the period 2022. Preliminary information and data from its field sources and personal interviews were collected through a questionnaire prepa
The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreBACKGROUND: Keratoconus is a progressive non inflammatory bilateral (usually asymmetric) ectatic corneal disease characterized by paraxial stromal thinning ,weakening that lead to corneal surface distortion ,vision loss primarily from irregular astigmatism and myopia and secondly from corneal scar. OBJECTIVE: To evaluate visual and refractive outcomes after intracorneal continuous ring (ICCR) implantation combined with intrapocket corneal collagen cross linking in patient with keratoconus. Setting: Eye Specialty Private Hospital, Baghdad, Iraq. METHODS: This study assessed the results of implantation of Myoring ICCR combined with CXL in 40 eyes with KC. Outcome measures include UDVA,CDVA(spectacle correction),refraction, complications and s
... Show MoreBackground:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g
... Show More