The inhibitor property of curcuma longa L. extract in different concentrations of simulated refinery wastewater (0.05% - 2% wt) and at various temperatures (30, 35 and 40 ˚C) was investigated using weight loss method. The results showed that the presence of about 1.2 % (v/v) of curcuma extract gave about 84% inhibition indicating its effectiveness on mild steel corrosion in simulated refinery wastewater, besides the adsorption process on the mild steal surface obeyed the Langmuir adsorption isotherm.
This research will deal in a simple way with the concept of urban expansion and taking the decision to sign the spatial signature of residential investment projects in order to reach through them in a real way to the extent of the proportionality of the decision taken, in light of the fulfillment of the conditions that must be met in the matter of making the decision of the spatial signature of the residential investment project and the extent of commitment to them, in which the conditions are: (Ease of access to services and transportation, adequacy of services, commitment to urban land uses) when establishing the investment project represented by the Al-Ayad residential project in the Hittin neighborhood of Al
... Show MoreResveratrol, (RES), a phytoalexin, is well-known for its anti-inflammatory and anti-oxidant properties. SEB, a superantigen, is known to trigger ALI and cause mortality. In the current study, we tested the effect of RES in a dual-dose model of SEB exposure that triggers ALI and causes 100% mortality in C3H/HeJ-mice. The data revealed RES attenuated SEB-induced ALI and prevented mortality. Forty eight hours post-SEB exposure, lung-infiltrating mononuclear cells were tested for microRNA expression profile to determine the epigenetic regulation by resveratrol. SEB-activated splenocytes were pre-treated with 50 μM of RES or vehicle for metabolic profile analysis by measuring oxygen consu
Abstract:
This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree
... Show MoreIn this study, dead and live anaerobic biomass was used in biosorption of Pb(II), Cr(III) and Cd(II) ions from a synthetic wastewater. The biosorption was investigated by batch adsorption experiments. It was found that, the biosorption capacities were significantly affected by biosorbent dosage. The process follows Langmuir isotherm (regression coefficient 0.995, 0.99 and 0.987 for Pb(II), Cr(III) and Cd(II) ions, respectively, onto dead anaerobic biomass) model with uniform distribution over the biomass surface. The experimental uptake capacity was 51.56, 29.2 and 28 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto dead anaerobic biomass, compared with 35, 13.6 and 11.8 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto live
... Show MoreOne of the most important techniques for preparing nanoparticle material is Pulsed Laser Ablation in Liquid technique (PLAL). Carbon nanoparticles were prepared using PLAL, and the carbon target was immersed in Ultrapure water (UPW) then irradiated with Q-switched Nd:YAG laser (1064 nm) and six ns pulse duration. In this process, an Nd:YAG laser beam was focused near the carbon surface. Nanoparticles synthesized using laser irradiation were studied by observing the effects of varying incident laser pulse intensities (250, 500, 750, 1000) mJ on the particle size (20.52, 36.97, 48.72, and 61.53) nm, respectively. In addition, nanoparticles were characterized by means of the Atomic Force Microscopy (AFM) test, pH easurement
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More