Metal-organic frameworks (MOFs) are a relatively new class of materials of unique porous structures and exceptional properties. Currently, more than 110,000 types of MOFs have been reported among the countless possibilities. In this study, we have synthesised a novel MOF using zirconium chloride as the metal source and 4,4'-dicarboxy-2,2'-biquinoline (bicinchoninic acid disodium salt) as the linker, which reacted in N,N-Dimethylformamide (DMF) solvent. Three preparation methods were employed to prepare five types of the MOF, and they were compared to optimize the synthesis conditions. The resulting MOFs, named Zr-BADS, were characterised using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), microscopy, and X-ray diffraction (XRD). By incorporating methanol into the preparation solvent, the surface area was increased to 396 m2/g. Additionally, the prepared MOFs exhibited amorphous shapes, with variations in size depending on the synthesis method. This research demonstrates the significance of the preparation method in controlling resulting particles’ properties.
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D
... Show MoreFocusing of Gaussian laser beam through nonlinear media can induce spatial self- phase modulation which forms a far field intensity pattern of concentric rings. The nonlinear refractive index change of material depends on the number of pattern rings. In this paper, a formation of tunable nonlinear refractive index change of hybrid functionalized carbon nanotubes/silver nanoparticles acetone suspensions (F-MWCNTs/Ag-NPs) at weight mixing ratio of 1:3 and volume fraction of 6x10-6 , 9x10-6 , and 18x10-6 using laser beam at wavelength of 473nm was investigated experimentally. The results showed that tunable nonlinear refractive indices were obtained and increasing of incident laser power density led to increase the nonlinear refractive inde
... Show MoreThe problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho
... Show MoreNew, simple and sensitive batch and reverse FIA spectrophotometric methods for the determination of doxycycline hyclate in pure form and in pharmaceutical preparations were proposed. These methods based on oxidative coupling reaction between doxycycline hyclate and 3-methylbenzothiazolinone-2-hydrazone hydrochloride (MBTH) in the presence ammonium ceric sulfate in acidic medium, to form green water-soluble dye that is stable and has a maximum absorbance at 626 nm. A calibration graph shows that a Beer's law is obeyed over the concentration range of 1-80 and 0.5-110 ?g.mL-1 of DCH for the batch and rFIA respectively with detection limit of 0.325 ?g.mL-1 of DCH for r-FIA methods. All different chemicals and physical experimental paramete
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More