This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value of the Cody gap of these films. While for the films prepared by Ferlauto et al. the value of the parameter is equal to and .
In study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
Abstract:
Background: Retinol binding protein 4 (RBP4), an adipokine that participate in a lipid metabolism or insulin resistance through a complex regulatory network. Recently, RBP4 was reported to be associated with many cardiovascular diseases (CVDs) risk factors in patients of type 2 diabetes mellitus (T2DM). This study aims to study the correlation of serum RBP4 with some markers of glycemic control, dyslipidemia, hypertension and obesity in T2DM Iraqi patients.
Subjects and Methods: one hundred fifty participants were enrolled in this coss-sectional study, 120 of participants were T2DM patients and 30 were apparently healthy individuals to serve as control gro
... Show MoreIn the present paper, chitosan Schiff base has been synthesized from chitosan’s reaction with the salicyldehyde. The AuNPs was manufacture by extract of onion peels as a reducing agent. The Au NPs that have been prepared were characterized through the UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan Schiff base / PVP has been prepared through using the approach of solution casting. Chitosan Schiff base / PVP Au nano-composites was prepared. Nano composites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1651cm-1 as a result of the (C=N) imine group. SEM, DSC and TGA confirms the thermal stability of the pr
... Show MoreThe incidence of disease and damage will increase, if environmental control and acceptable management practices are not provided during the rearing period. Ascites affect young broilers with rapid growth, and the most critical factor in causing ascites syndrome is the lack of oxygen in body tissues (hypoxia). This research aimed to investigate the effect of olive leaves hydroalcoholic extract and probiotics (LactoFeed) on experimental ascites caused by levothyroxine in male broiler chickens. The present study was an interventional type, and for its implementation, a single-factor design was used in eight groups with 3 replicates. Data were analyzed based on a one-way analysis of variance. Blood parameters of male chick
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure