This paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed a good response in terms of significant wavelength shift in corresponding to varying Cu2+ concentrations when immersed in aqueous mediums. The sensors exhibited excellent repeatability towards Cu ions.The results demonstrate that the smaller FBG etching diameter, the better optical response in terms of wavelength and linearity.
Transition metal complexes of Co(II), Ni(II), Cu(II), and Zn(II) with 2-(4-antipyrine azo)-4-nitroaniline derived from 4-aminoantipyrine and 4-nitroaniline were synthesized. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR, UV-Vis and 1HNMR, as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). High molar absorbtivity of the complex solutions were observed. From the analytical data, the stoichiometry of the complexes has been found to be 1:2 (metal:ligand). On the basis of physicochemical data octa
... Show MoreThe cost-effective removal of heavy metal ions represents a significant challenge in environmental science. In this study, we developed a straightforward and efficient reusable adsorbent by amalgamating chitosan and vermiculite (forming the CSVT composite), and comprehensively investigated its selective adsorption mechanism. Different techniques, such as Fourier-transform infrared spectroscopy (FTIR), zeta potential analysis, scanning electron microscopy (SEM), X-ray diffraction (XRD), and Brunauer, Emmett, Teller (BET) analysis were employed for this purpose. The prepared CSVT composite exhibited a larger surface area and higher mesoporosity increasing from 1.9 to 17.24 m2/g compared to pristine chitosan. The adsorption capabilities of the
... Show Moreالوصف The synthesis of 2 (N-phenyl dithio carboxamid) benzothiazol Ligand (L) from reaction of 2-Mercaptobenzothiozol with phenylisothiocyanate using ratio 1: 1. The ligand was characterized by elemental analysis (CHN),'H-NMR, IR and UV-Vis. The complexes with bivalent ions (Ni, Cu, Zn, Cd and Hg) have been prepared and characterized. The structural diagnosis was established using IR, UV–Visible spectro photometer, molar conductivity, atomic absorption and molar ratio with selected metal ions (Ni2+, Cu2+). The complexes of (Ni, Cu) gave octahedral structural while the complexes of (Zn, Cd, Hg) gave tetrahedral structural. The study of biological activity of the ligand (L) and its complexes (Ni, Cu, Hg) in two deferent concentration (
... Show MoreAn innovative desalination method called electrosorption or capacitive deionization (CDI) has significant benefits for wastewater treatment. This process is performed by using a carbon fiber electrode as a working electrode to remove hexavalent chromium ions from an aqueous solution. The pH, NaCl concentration, and cell voltage were optimized using the Box-Behnken experimental design (BDD) in response surface methodology (RSM) to study the effects and interactions of selected variables. To attain the relationship between the process variables and chromium removal, the experimental data were subjected to an analysis of variance and fitted with a quadratic model. The optimum conditions to remove Cr(VI) ions were: pH of 2, a cell voltage of 4.
... Show MoreBeta-thalassemia major (β-TM) is inheritable condition with many complications especially in children. The blood-borne viral infection was proposed as a risk factor due to recurrent blood transfusion regimen (hemotherapy).
This study aimed to investigate Human parvovirus B19 (PVB19) prevalence in β-TM patients by serological and molecular means.
This is a cross-section
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.