The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface areas showed considerable difference between the two sets of data on the same material. This indicates that the material have an external surface which can not be measure by mercury porosimeter. Also pore size distribution data obtained from N2 adsorption measurements shows a wide range of the smallest pore size. This result suggests that materials have micropores using IUPAC definitions of pore size.
The biosorption of Pb (II), Cd (II), and Hg (II) from simulated aqueous solutions using baker’s yeast biomass was investigated. Batch type experiments were carried out to find the equilibrium isotherm data for each component (single, binary, and ternary), and the adsorption rate constants. Kinetics pseudo-first and second order rate models applied to the adsorption data to estimate the rate constant for each solute, the results showed that the Cd (II), Pb (II), and Hg (II) uptake process followed the pseudo-second order rate model with (R2) 0.963, 0.979, and 0.960 respectively. The equilibrium isotherm data were fitted with five theoretical models. Langmuir model provides the best fitting for the experimental results with (R2) 0.992, 0
... Show MoreChoosing an appropriate impression material is a challenge for many dentists, yet an essential component to provide an excellent clinical outcome and improve productivity and profit. The purpose of present study was to compare wettability, tear strength and dimensional accuracy of three elastomeric impression materials, with the same consistencies (light-body). Three commercially available light body consistency and regular set 3M ESPE Express polyvinylsiloxane (PVS), 3M ESPE Permadyne polyether (PE), and Identium (ID), impression materials were comparedTear strength test, contact angle test and linear dimensional accuracy were evaluated for three elastic impression material. Among the three experimental groups PE impression materia
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreNitrogen (N) and phosphorus (P) are the most important nutrients for crop production. The N contributes to the structural component, generic, and metabolic compounds in a plant cell. N is mainly an essential part of chlorophyll, the compound in the plants that is responsible for photosynthesis process. The plant can get its available nitrogen from the soil by mineralizing organic materials, fixed-N by bacteria, and nitrogen can be released from plant as residue decay. Soil minerals do not release an enough amount of nitrogen to support plant; therefore, fertilizing is necessary for high production. Phosphorous contributes in the complex of the nucleic acid structure of plants. The nucleic acid is essential in protein synthesis regulation; t
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreMercury(II) ion is extracted as ion pair with thiocyanate using DCM .The effects of different parameters affecting the ease of extraction are determined . These parameters are pH ,Thiocyanate ion concentration ,type and concentration of the counter cation concentration of the reagent , temperature and type of solvents .Other crown ethers (15C5 DB24C , DCH18C6 and 18C6 and cryptand- 222 are investigated as extracting reagents using slop analysis method UV-visible and IR spectrometry .CHN analysis and melting points determination are perfored for comlex analysis .All these investigations indicated the formula [k+CE]2[Hg (SCN )4]-2.
This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5NPs were determined using the (EDX) pattern, Atomic force microscopy AFM. The a
... Show More