في الدراسة الحالية، تم تصنيع جسيمات ZrO2 النانوية باستخدام مستخلص نباتي مشتق من نبات Vitex agnus castus، ووسط قلوي مثل هيدروكسيد الصوديوم. تم استخدام أسلوب التخليق الحيوي لتحضير جزيئات أوكسيد الزركونيوم النانوية لهذا المشروع البحثي. تتميز هذه الطريقة عن غيرها بسبب فعاليتها من حيث التكلفة وبساطتها وقلة المخاطر المحتملة. وتم تشخيص العينات المحضرة باستخدام المجهر الإلكتروني النافذ TEM، المجهر الإلكتروني الماسح SEM، التحليل الطيفي بالأشعة تحت الحمراء بتحويل فورييه FT-IR، التحليل الطيفي فوق البنفسجي المرئي. ، حيود الأشعة السينية، والتحليل الطيفي للأشعة السينية المشتتة من الطاقة EDX. تم تحديد حجم البلورة باستخدام حيود الأشعة السينية من معادلة ديباي-شيرر بقيمة 26.37 نانومتر. تم استخدام المجهر الإلكتروني الماسح والمجهر الإلكتروني النافذ للتأكد من حجم جسيمات ZrO2 النانوية. في هذه الدراسة، أظهرت هذه الجسيمات النانوية مستويات متفاوتة من النشاط ضد نوعين من البكتيريا إيجابية الجرام ( Staphylococcus aurous و Streptococcus pneumonia)، ونوعين من البكتيريا السالبة الجرام (Proteus mirabilis و Escharia coli)، ونوع واحد من الفطريات وهو Candida. ومن المثير للاهتمام، أنه تم الكشف عن الإمكانات المضادة للسرطان لجسيمات أوكسيد الزركونيوم النانوية المركبة من خلال اختبار MTT بتركيز متنوعة لسرطان الرئة A549 من خط الخلية. وأظهرت نسبة التثبيط زيادة مع زيادة التركيز. إن حساب تثبيط نصف الخلايا IC50، والذي كان يساوي (58.4 ملغم/مل)، يشير إلى أن جزيئات أكسيد الزركونيوم النانوية لديها القدرة على الاستفادة منها في علاج السرطان
The message of our Prophet Muhammad (peace and blessings of Allaah be upon him) was the most complete of the messages, and the conclusion of the messages and completed by the mercy of this nation. Al-Khalal al-Baghdadi al-Hanbali (may Allaah have mercy on him) was a scholar who updated his writings. And The Nha Brhnha and became an independent and arranged doctrine Such a world of Galilee Hambali must show his character and his knowledge and its impact on the Islamic arena.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p
This paper aims to find new analytical closed-forms to the solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreBackground: Polycystic ovary syndrome (PCOS) has an unknown and complex etiology. It affects 5–10% of women in the reproductive age. Patients are known to have increased ovarian androgen production that is associated with decreased menses, hirsutism, and acne. Urinary tract stones (UTS) are a multifactorial disorder, with age and sex being known risk factors. Many PCOS patients are obese, and links between nephrolithiasis and obesity have been shown previously. Objectives: To identify the relation between PCOS and UTS considering the patients' body mass index (BMI). Methods: This is a cross-sectional study that enrolled 407 women aged 18-40 who attended the gynecology and obstetrics clinic at Al-Elwiya Maternity Teaching Hospital.
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show More