Adsorption of Chlorophenol compounds in aqueous solution on Iraqi siliceouns rocks powder have been investigated. UV technique has been used to determine the adsorption isotherms. The results showed that the adsorption isotherms obeyed Freundlich adsorption equation. The adsorption was endothermic process, increasing temperature leads to increasing adsorption. H, S, G were calculated. The results showed that the adsorption increases with increasing acidity of solutions
تم استخدام خرائط ضبط الجودة الإحصائية لتقييم جودة الخدمة التعليمية في جامعة الباحة، ويهدف هذا البحث إلى استخدام خرائط ضبط الجودة الإحصائية لقياس مستوى الجودة وفجوة الجودة بين توقعات الطلبة وإدراكاتهم لمستوى الخدمة الذي تقدمه جامعة الباحة. حيث تم اختيار عينة من 200 طالب وطالبة عشوائيا باستخدام العشوائية العنقودية من 4 كليات خلال الفترة 01 – 30/2015م، وجمعت البيانات من خلال استبيان جودة الخدمة الذي يقيس ت
... Show MoreA faunistic review of the genus Chaitophorus Koch, 1854, including four species in Iraq is given; the distribution data of each species and their hosts have been recorded. In this investigation the poplar leaf aphid Ch. populialbae (Boyer de Fonscolombe, 1841) is recorded here for the first time in Iraq on popular trees Populus euphratica Oliv. during the period from November 2016 to April 2017 in Baghdad province.
A brief description for apterous viviparous female of this species is given; and a key to the species of the genus Chaitophorus is constricted.
Three mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreAbstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More