Electronic properties such as density of state, energy gap, HOMO (the highest occupied molecular orbital) level, LUMO (the lowest unoccupied molecular orbital) level and density of bonds, as well as spectroscopic properties like infrared (IR), Raman scattering, force constant, and reduced masses for coronene C24, reduced graphene oxide (rGO) C24O5and interaction between C24O5and NO2gas molecules were investigated. Density functional theory (DFT) with the exchange hybrid function B3LYP with 6-311G** basis sets through the Gaussian 09 W software program was used to do these calculations. Gaussian view 05 was employed as a supplementary software to investigate the geometrical structure of C24, C24O5and the interaction of C24O5with NO2gas molecule. It shows the energy gap of coronene C243.5 eV because the effect of quantum confinement and the Coulomb interaction geometry greatly influence the quasi-particle band gap and C24Oxwhere x = 1–7 was from 0.89 eV to 1.6862 eV a function of number of oxygen atoms and compared with the experiment value of graphene oxide which was between 1 eV and 2.2 eV. The spectroscopic properties were compared with the experiment value of graphene, graphene oxide and NO2longitudinal optical (LO) modes of 1 585, 1 582 and 1 600 cm−1, respectively. The transition state of the interaction of rGO with nitrogen dioxide and Gibbs energy, enthalpy, activation entropy and reaction at various temperatures between 25°C and 100°C were calculated. The activation energy of C24O5with nitrogen dioxide decreases with increasing temperature.
Osmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreObjective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
Background: The purpose of this study was to evaluate the effect of in vitro long-term simulation of oral conditions on the bond strength of PEEK CAD/CAM lingual retainers.
Material and methods: The sample consisted of 12 PEEK CAD/CAM retainers each composed of 2 centrally perforated 3x4mm pads joined by a connector. They were treated by 98% sulfuric acid for 1 minute and then conditioned with Single Bond Universal and bonded to the lingual surface of premolar teeth by 3M Transbond TM System. Half of the retainers were artificially aged using a 30-day water storage and 5000 thermocycling protocol before bond strength testing to compare with the non-aged specimens.
Results: The artificially aged retainers showed a marginally
... Show MoreThe measurement of vitamin B1 in pure and pharmaceutical formulations was proposed by using a straightforward and sensitive spectrophotometric approach. Sulfacetamide (SFA) is diazotized, then coupled with vitamin B1 in alkaline media to produce a colored azo dye complex with a stability constant of 5.597 × 105 L/mol. The product is stable, with a maximum absorption wavelength of 489.5 nm, molar absorptivity of 10108 L/mol∙cm, Sandell's sensitivity of 0.0334 μg/cm2, detection limit of 0.0135 μg/mL, and Beer's law being observed over the concentration range of 0.2–20.0 μg/mL. The stability constant and stoichiometry of the produced azo dye were calculated using the continuous variation (Job's) and mole ratio methods. The suggested ap
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More