A crucial area of research in nanotechnology is the formation of environmentally benign nanoparticles. Both unicellular and multicellular play an important role in synthesis nanoparticles through the production of inorganic materials either intracellularly or extracellularly. The agents (pigments, siderophores, cell extracted metabolites and reducing compounds) were used to prepare silver nanparticles with different sizes and shapes. The color variations (dark yellow, slightly dark yellow and golden yellow) arising from changes in the composition, size, and shape of nanoparticles, surrounding medium can be monitored using UV-visible spectrophotometer. These effects are due to the phenomena called surface plasmon resonance. The silver nanoparticles have Plasmon resonances ranged between (390, 383 and 365) nm which they are among the limitation of silver nanoparticles (360-420 nm). AFM analysis of Ag NP's showed partially purified big triangular Ag NP having edge length around ~1. m. Hexagonal particles on the background of a matrix made up of some molecules which may be metabolites products are found. Small spherical nanoparticles embedded in some kind of matrix indicate that this molecule acts as capping agent, which inhibits further growth of nanoparticles. Also ribbons like structures of width around 50 nm which are intertwined are the noble and rare structures which are synthesized by this method. MIC of silver Nanoparticles for. E coli, ranges between 80-90 µg/ml.., Serrtia, ranges between 50-60 µg/ml and Shagilla, ranges between 90-100 µg/ml.
Programs and performance budget represents a sophisticated method of public budget numbers, which includes all allocations to be determined for each job or activity within a government entity, which is analyzed according to their needs and costs, and this method can be applied using one of the cost accounting techniques, which is the technique of analyzing the value chain that reduces costs by avoiding activities that do not add value and enhance activities that add value to the economic entity, the current research aims to develop the budget system in government entity by using the budget of programs and performance as a tool for planning and monitoring events and activities, thereby reducing the waste of public money by reducing unnecessa
... Show MoreThe green synthesis of nickel oxide nanoparticles (NiO-NP) was investigated using Ni(NO3)2 as a precursor, olive tree leaves as a reducing agent, and D-sorbitol as a capping agent. The structural, optical, and morphology of the synthesized NiO-NP have been characterized using ultraviolet–visible spectroscopy (UV-Vis), X-ray crystallography (XRD) pattern, Fourier transform infrared spectroscopy (FT-IR) and scanning electron microscope (SEM) analysis. The SEM analysis showed that the nanoparticles have a spherical shape and highly crystalline as well as highly agglomerated and appear as cluster of nanoparticles with a size range of (30 to 65 nm). The Scherrer relation has been used to estimate the crystallite size of NiO-NP which ha
... Show MoreThe research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'
... Show MoreWith the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.