In this research, the degradation of Dazomet has been studied by using thermal Fenton process and photo-Fenton processes under UV and lights sun. The optimum values of amounts of the Fenton reagents have been determined (0.07g FeSO4 .7H2O, 3.5µl H2O2) at 25 °C and at pH 7 where the degradation percentages of Dazomet were recorded high. It has been found that solar photo Fenton process was more effective in degradation of Dazomet than photo-Fenton under UV-light and thermal Fenton processes, the percentage of degradation of Dazomet by photo-Fenton under sun light are 88% and 100% at 249 nm and 281 nm respectively, while the percentages of degradation for photo-Fenton under UV-light are 87%, 96% and for thermal Fenton are 70% and 66
... Show MoreIn this research, the degradation of Dazomet has been studied by using thermal Fenton process and photo-Fenton processes under UV and lights sun. The optimum values of amounts of the Fenton reagents have been determined (0.07g FeSO4 .7H2O, 3.5µl H2O2) at 25 °C and at pH 7 where the degradation percentages of Dazomet were recorded high. It has been found that solar photo Fenton process was more effective in degradation of Dazomet than photo-Fenton under UV-light and thermal Fenton processes, the percentage of degradation of Dazomet by photo-Fenton under sun light are 88% and 100% at 249 nm and 281 nm respectively, while the percentages of degradation for photo-Fenton under UV-light are 87%, 96% and for thermal Fenton are 70% and 66.8% at 2
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreAdversity and psychosocial stress are involved in aging through the following pathways. psychological stress enhances the nerve system to secrete endocrine mediators (hormones). Mitochondrial respiration mediates energy production stimulated by binding to these hormones to their receptors. Energy produced by mitochondria accelerates metabolism and, in its turn, leads to increases in reactive oxygen species (ROS) of free radicals. Cellular stress and accumulation of damage can result from an excess of ROS. Accumulation of damage comprises damages in telomeric and nontelomeric DNA, in addition to mitochondrial DNA. Mitochondrial DNA damage plays an important role in increasing the pathway of p53/p21. The expression of the PGC-1α gene
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show More