This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5NPs were determined using the (EDX) pattern, Atomic force microscopy AFM. The adsorption experiment was successfully conducted on metal ions M (II), such as Co, Ni, and Cu. The results proved removal simultaneously from water using V2O5NPs based on surface shape on the affinity of three metal ions. The adsorption rate of Ni(II) is the highest one in the time scale and conditions of our experiment at all surfaces, while Co(II) and Cu(II) ions are close in magnitude. The removal efficiencies of mixed (M+2 = Co, Ni, and Cu) ions with λmax for Co, Ni, and Cu ions are 510,425 and 814 nm 56.66%, 77.00%, and 27.23%, respectively. The Antimicrobial activity of V2O5NPs in three concentrations, 25%, 50%, and 75%, was tested against Escherichia coli, Staphylococcus aureus, and Candida albicans fungus. The results of the inhibition of vanadium oxide nanoparticles against positive and negative bacteria were compared with the standard drug Amoxicillin and the results of fungus inhibition with the standard drug Metronidazole. It was found that nano-oxide is more effective at 75% concentration.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreAnal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
The most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThe structural, optical properties of copper oxide thin films ( CuO) thin films which have been prepared by thermal oxidation with exist air once and oxygen another have been studied. Structural analysis results of Cu thin films demonstrate that the single phase of Cu with high a crystalline structure with a preferred orientation (111). X-ray diffraction results confirm the formation of pure (CuO) phase in both methods of preparation. The optical constant are investigated and calculated such as absorption coefficient, refractive index, extinction coefficient and the dielectric constants for the wavelengths in the range (300-1100) nm.
The research dealt with the subject of measuring the competitive performance of the National Insurance Company and some of its branches (Basra, Ninwa, Kirkuk and Babil), Depending on the Revenue Growth Index at the activity level, and the Revealed Comparative Advantage Index RCAIAt the branch level,To measure the competitiveness of the company And some branches, As the problem of research in the lack of adoption by some companies in the insurance service sector on scientific indicators to measure their competitive performance, The aims of the research is to measure the competitiveness of the National Insurance Company, as well as the competitiveness of its branches according to the scientific method, One of the main Conclusions of the re
... Show MoreNatural bentonite (B) mineral clay was modified by anionic surfactant sodium dodecyl sulfate (SDS) and characterized using different techniques such as: FTIR spectroscopy, scanning electron microscopy (SEM) and X-Ray diffraction (XRD). The bentonite and modified bentonite were used as adsorbents for the adsorption of methyl violet (MV) from aqueous solutions. The adsorption study was carried out at different conditions such as: contact time, pH value and adsorbent weight. The adsorption kinetic described by pseudo– first order and pseudo – second order equilibrium experimental data described by Langmuir, Freundlich and Temkin isotherm models. The thermodynamic parameters standard free energy ( ), standard entropy ( ) standa
... Show MoreRemoval of Congo red, Rhodamine B, and Dispers Blue dyes from water solution have been achieved using Flint Clay as an adsorbent. The adsorption was studied as a function of contact time, adsorbent dose, pH, and temperature under batch adsorption technique. The equilibrium data fit with Langmuir, Freundlich and Toth models of adsorption and the linear regression coefficient R2 was used to elucidate the best fitting isotherm model. Different thermodynamic parameters, namely Gibb’s free energy, enthalpy and entropy of the on-going adsorption process have also been evaluated. Batch technique has been employed for the kinetic measurements and the adsorption of the three dyes follows a second order rate kinetics. The kinetic investigations al
... Show More