Water pollution has created a critical threat to the environment. A lot of research has been done recently to use surface-enhanced Raman spectroscopy (SERS) to detect multiple pollutants in water. This study aims to use Ag colloid nanoflowers as liquid SERS enhancer. Tri sodium phosphate (Na3PO4) was investigated as a pollutant using liquid SERS based on colloidal Ag nanoflowers. The chemical method was used to synthesize nanoflowers from silver ions. Atomic Force Microscope (AFM), Scanning Electron Microscope (SEM), and X-ray diffractometer (XRD) were employed to characterize the silver nanoflowers. This nanoflowers SERS action in detecting Na3PO4 was reported and analyzed concerning both shape and size using a 532 nm laser. We observed that the nanoflower's structure produced strong SERS signals. The increase in the SERS signal is related to the deposition of Na3PO4 molecules in the aggregated silver nanostructure in the solution. The concentration of Na3PO4 plays a main role in detection since the Raman signal becomes stronger as the concentration increases. The highest phosphate analytical enhancement factor obtained for SERS in colloidal nanoflowers was 1.7×103 at 0.7×10-6 M which was the lowest concentration.
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Introduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp
... Show MoreCapillary pressure is a significant parameter in characterizing and modeling petroleum reservoirs. However, costly laboratory measurements may not be sufficiently available in some cases. The problem amplifies for carbonate reservoirs because relatively enormous capillary pressure curves are required for reservoir study due to heterogeneity. In this work, the laboratory measurements of capillary pressure and formation resistivity index were correlated as both parameters are functions of saturation. Forty-one core samples from an Iraqi carbonate reservoir were used to develop the correlation according to the hydraulic flow units concept. Flow zone indicator (FZI) and Pore Geometry and Structure (PGS) approaches were used to identify
... Show Morethirty adult NewZealand rabbits used in this study, they were divided in to two groups (control and treaded with Helium — Neon laser). A square skin flap done on the medial aspect of the auricle of both sides, a square piece of cartilage incised, pealed out from each auricle and fixed in the site of the other, then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated using a Helium —Neon laser with (5mw) power for (10 days) began after the operation directly, (3 rabbits) from each group used for collection of specimens for histopathological examination at the weeks (1,2,3,4, & 6) weeks post the operation .The results revealed Early invasion of the matrix with elastic fibers which continue to t
... Show Moreإن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show MoreIn this study predication of crop coefficient (Kc) values through growing season for cucumber plant was conducted. A field experiment was carried out at AL Yusufiyah Township, in the Governorate of Baghdad, (latitude: 33°09' N, longitude: 44°24' E, and altitude: 34 m) in medium loam soil. The plant was cultivated inside the greenhouse under subsurface trickle irrigation system with soil water retention technology (SWRT) during the growing season 2017. Crop coefficient values were guessed from the direct method of measurements of daily crop evapotranspiration, while reference evapotranspiration was obtained from Agricultural Meteorology Project - Station of Baghdad - Abu-Ghraib. The obtained results were showed that crop coeffici
... Show MoreInternet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More