The current study was to examine the reliability and effectiveness of using most abundant, inexpensive waste in the form of scrap raw zero valent aluminum ZVAI and zero valent iron ZVI for the capture, retard, and removal of one of the most serious and hazardous heavy metals cadmium dissolved in water. Batch tests were conducted to examine contact time (0-250) min, sorbent dose (0.25-1 g ZVAI/100 mL and 2-8 g ZVI/100 mL), initial pH (3-6), pollutant concentration of 50mg/L initially, and speed of agitation (0-250) rpm . Maximum contaminant removal efficiency corresponding to (90 %) for cadmium at 250 min contact time, 1g ZVAI/ 6g ZVI sorbent mass ratio, pH 5.5, pollutant concentration of 50 mg/L initially, and 250 rpm agitation speed were obtained. Langmuir and Freundlich isotherms were presumed to fit the batch kinetics data for the sorption of Cd(II) onto ZVAI and/or ZVI and found that Langmuir (I) was the most representative model type with coefficient of determination R2 greater than 0.9115. Kinetics data for the sorption of Cd(II) onto ZVAI/ZVI mixture and due to the good agreement between the fitted and the experimental results; the data was found to obey the pseudo second order model. The scanning electron microscopy (SEM) for the ZVI and ZVAI was conducted before and after the sorbent-liquid reaction and revealed distinct morphological changes in the sorbent surface due to the contaminant saturation and pore channel blockages that ceased the sorption process.
In the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th
... Show MoreKS Ismaeil, BR Jawad, Journal of Physical Education, 2023
Five new ceftazidime derivatives were designed and synthesized in an attempt to improve the acid stability and may increase the spectrum of ceftazidime. The synthesized compounds included; Schiff base of ceftazidime (compound 1), ceftazidime lysine amide Schiff base (compound 2), ceftazidime lysine amide (compound 3), ceftazidime-di-lysine amide Schiff base (compound 4) and ceftazidime-di-lysine amide (compound 5). New ceftazidime derivatives were successfully prepared characterized and identified using spectral and elemental microanalysis (CHNS) analyses and the results comply with the calculated measurements.
Compounds 1 and 2 were subjected to a stability study in phosphate buffer (0.2M, pH 7.4) and in KCl/HCl buffer (0.
... Show MoreIn Iraq, government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider one of the main sources of funding, if not it consider the basis of funding.
According to the vital roles assigned to these institutions to follow up, which usually include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade. As a result, the aim of this study came to came to highlight&n
... Show MoreThe levels of circulating angiogenic and anti-angiogenic factors, namely vascular endothelial growth factor–A (VEGF-A) and soluble vascular endothelial growth factor receptor-1 (sVEGFR-1), have been linked to the development of renal dysfunction due to the proliferation of microvasculature within the kidneys of type 2 diabetic (T2DM) patients. The study aims to scrutinize serum levels of VEGF and sVEGFR-1 in a sample of Iraqi diabetic nephropathy patients to support their reliability as markers for the prediction of nephropathy in type 2 diabetes mellitus patients as well as to assess the ACE inhibitor’s effect on the levels of these two markers. Method: The ninety participants of this case-control study were split into three gr
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More