Pure and Fe-doped zinc oxide nanocrystalline films were prepared
via a sol–gel method using -
C for 2 h.
The thin films were prepared and characterized by X-ray diffraction
(XRD), atomic force microscopy (AFM), field emission scanning
electron microscopy (FE-SEM) and UV- visible spectroscopy. The
XRD results showed that ZnO has hexagonal wurtzite structure and
the Fe ions were well incorporated into the ZnO structure. As the Fe
level increased from 2 wt% to 8 wt%, the crystallite size reduced in
comparison with the pure ZnO. The transmittance spectra were then
recorded at wavelengths ranging from 300 nm to 1000 nm. The
optical band gap energy of spin-coated films also decreased as Fe
doping concentra
This study aims at recognizing Pesticides and how the process of pesticides biodegradation by microbiology took place, and the effect of environmental condition on this process. And how the research uncovered the efficiency of microbiology in the biodegradation process of pesticides, as the perfect temperature for the biodegradation process is 40 °C and humidity effect on pesticides efficiency, when high humidity reduces pesticide efficiency and the perfect acidity to increase bacteria efficiency is 7, for the incubation period, it was found during the previous studies that the best incubation period is 5-7 days, in this period the bacteria imprint on pesticides and increase biodegradation of it.
This study was conducted in the botanical garden, Department of biology, College of Science/ Mustansiriyah University in from (15 February to 15 March, 2019) under the natural environmental conditions in the greenhouse in order to evaluate the effectiveness of parsley aqueous extract as a promoter for rooting. The study included the use of aqueous extract of a plant Parsley (Petroselinum crispum) extract was used in concentrations (1.25, 2.5 g / l), compare with IBA in concentration (100 mg / L) with dipping time 24 hour for all treatments. The cutting stems were included Rosmarinus officinalis, Nerium oleander, Olea europaea, Plumeria alba, Hibiscus rosa, Pelargonium graveolens, and Myrtus communis. The following measurements were
... Show MoreAbstract
This research aims to analyze the reality of the production process in an assembly line Cars (RUNNA) in the public company for the automotive industry / Alexandria through the use of some Lean production tools, and data were collected through permanence in the company to identify the problems of the line in order to find appropriate to adopt some Lean production tools solutions, and results showed the presence of Lead time in some stations, which is reflected on the customer's waiting time to get the car, as well as some of the problems existing in the car produced such as high temperature of the car, as the company does not take into account customer preferences,
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe aim of the study was to identify the use of the strategies of numbered heads and brainstorming in learning handspring on the Vault table in artistic gymnastics for Men for the third grade students in the collage of Physical Education and Sport Sciences, as well as to identify the best group among the three research groups (number of heads numbered,, brainstorming strategies And the traditional style group) to learn the skill under study. Using the experimental method, the research subject included the third grade students in the collage of Physical Education and Sports Sciences / University of Baghdad, and randomly by lot, 12 students were selected for each of the three research groups. The study consisted of the arithmetic mean
... Show MoreA simple, economical and selective method employing ion pair dispersive liquid−liquid microextraction (DLLME) coupled with spectrophotometric determination of carbamazepine (CBZ) in pharmaceutical preparations and biological samples was developed. The method is based on reduction of Mo(VI) to Mo(V) using a combination of ammonium thiocyanate and ascorbic acid in acidic medium to form a red binary Mo(V) thiocyanate complex. After addition of CBZ to the complex, extraction of the formed CBZ−Mo(V)−(SCN)6 was performed using a mixture of methylene chloride and methanol. Then, the measurement of target complex was performed at the wavelength of 470 nm. The important extraction parameters affecting the efficiency of DLLME were studied and o
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More