A novel technique for nanoparticles with a chemical method and impact for resistance bacteria methicillin-resistant Staphylococcus aureus (MRSA), UV-visible analysis confirmed the by Fourier transform infrared spectroscopy (FT-IR) and Energy dispersive X-Ray (EDX), Scanning electron microscope (SEM) and X-ray diffraction pattern estimation antimicrobial excellent antibacterial activity against MRSA (with zone of inhibition of 11 ± 02 mm , 9 ± 01 mm,8 ± 03 mm and 7.5 ± 02 mm and 6.5 ± 02 mm) at different concentrations (0.5 ,0.25, 0.125, 0.0625, 0.03125) mg/ml while good activity was 16 ± 03 mm at 17 ± 02 mm zone at 0.25, 0.125 mg/mL, respectively. The increase in microorganism resistance to antibiotics a couple of have caused Antimicrobial factors are widely recognized (ZnO NPs) and are less toxic and biological safety . evaluation of MRSA by minimum inhibitory concentration (MIC) (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/Ml of ZnO NPs. This research aims to study zinc oxide (ZnO) nanoparticles synthesis and antibacterial. In vivo evaluation precipitation method of cytotoxicity was determined WRL68 normal A375 cells.
This study involved the treatment of textile wastewater contaminated with direct blue 15 dye (DB15) using a heterogeneous photo-Fenton-like process. Bimetallic iron/copper nanoparticles loaded on bentonite clay were used as heterogeneous catalysts and prepared via liquid-phase reduction method using eucalyptus leaves extract (E-Fe/Cu@BNPs). Characterization methods were applied to resultant particles (NPs), including SEM, BET, and FTIR techniques. The prepared NPs were found with porous and spherical shapes with a specific surface area of particles was 28.589 m2/g. The effect of main parameters on the photo-Fenton-like degradation of DB15 was investigated through batch and continuous fixed-bed systems. In batch mode, pH, H2O2 dosage, DB15 c
... Show MoreA modified chemical method was used to prepare titanium dioxide nanoparticles (TiO2 NPs), which were diagnosed by several techniques: X-ray diffraction, Fourier transform infrared, field emission scaning electron microscopy, energy disperse X-ray, and UV-visible spectroscopy, which proved the success of the preparation process at the nanoscale level. Where the titanium oxide particles have an average particle size equal to 6.8 nm, titanium dioxide particles were used in the process of adsorption of Congo red dye from its aqueous solutions using a batch system. The titanium oxide particles gave an adsorption efficiency of Congo red dye up to more than 79 %. The experimental data of the adsorption process were analyzed with kinetic models and
... Show MoreThis study relates to synthesis of bentonite-supported iron/copper nanoparticles through the biosynthesis method using eucalyptus plant leaf extract, which were then named E-Fe/Cu@B-NPs. The synthesised E-Fe/Cu@B-NPs were examined by a set of experiments involving a heterogeneous Fenton-like process that removed direct blue 15 (DB15) dye from wastewater. The resultant E-Fe/Cu@B-NPs were characterised by scanning electron microscopy, Brunauer–Emmet–Teller analysis, zeta potential analysis, Fourier transform infrared spectroscopy and atomic force microscopy. The operating parameters in batch experiments were optimised using Box–Behnken design. These parameters were pH, hydrogen peroxide (H2O2
... Show MoreCancer disease has a complicated pathophysiology and is one of the major causes of death and morbidity. Classical cancer therapies include chemotherapy, radiation therapy, and immunotherapy. A typical treatment is chemotherapy, which delivers cytotoxic medications to patients to suppress the uncontrolled growth of cancerous cells. Conventional oral medication has a number of drawbacks, including a lack of selectivity, cytotoxicity, and multi-drug resistance, all of which offer significant obstacles to effective cancer treatment. Multidrug resistance (MDR) remains a major challenge for effective cancer chemotherapeutic interventions. The advent of nanotechnology approach has developed the field of tumor diagnosis and treatment. Cancer nanote
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show MoreThe researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show More