في الدراسة الحالية، تم تصنيع جسيمات ZrO2 النانوية باستخدام مستخلص نباتي مشتق من نبات Vitex agnus castus، ووسط قلوي مثل هيدروكسيد الصوديوم. تم استخدام أسلوب التخليق الحيوي لتحضير جزيئات أوكسيد الزركونيوم النانوية لهذا المشروع البحثي. تتميز هذه الطريقة عن غيرها بسبب فعاليتها من حيث التكلفة وبساطتها وقلة المخاطر المحتملة. وتم تشخيص العينات المحضرة باستخدام المجهر الإلكتروني النافذ TEM، المجهر الإلكتروني الماسح SEM، التحليل الطيفي بالأشعة تحت الحمراء بتحويل فورييه FT-IR، التحليل الطيفي فوق البنفسجي المرئي. ، حيود الأشعة السينية، والتحليل الطيفي للأشعة السينية المشتتة من الطاقة EDX. تم تحديد حجم البلورة باستخدام حيود الأشعة السينية من معادلة ديباي-شيرر بقيمة 26.37 نانومتر. تم استخدام المجهر الإلكتروني الماسح والمجهر الإلكتروني النافذ للتأكد من حجم جسيمات ZrO2 النانوية. في هذه الدراسة، أظهرت هذه الجسيمات النانوية مستويات متفاوتة من النشاط ضد نوعين من البكتيريا إيجابية الجرام ( Staphylococcus aurous و Streptococcus pneumonia)، ونوعين من البكتيريا السالبة الجرام (Proteus mirabilis و Escharia coli)، ونوع واحد من الفطريات وهو Candida. ومن المثير للاهتمام، أنه تم الكشف عن الإمكانات المضادة للسرطان لجسيمات أوكسيد الزركونيوم النانوية المركبة من خلال اختبار MTT بتركيز متنوعة لسرطان الرئة A549 من خط الخلية. وأظهرت نسبة التثبيط زيادة مع زيادة التركيز. إن حساب تثبيط نصف الخلايا IC50، والذي كان يساوي (58.4 ملغم/مل)، يشير إلى أن جزيئات أكسيد الزركونيوم النانوية لديها القدرة على الاستفادة منها في علاج السرطان
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis work investigates the impacts of eccentric-inclined load on ring footing performance resting on treated and untreated weak sandy soil, and due to the reduction in the footing carrying capacity due to the combinations of eccentrically-inclined load, the geogrid was used as reinforcement material. Ring radius ratio and reinforcement depth ratio parameters were investigated. Test outcomes showed that the carrying capacity of the footing decreases with the increment in the eccentric-inclined load and footing radius ratio. Furthermore, footing tilt and horizontal displacement increase with increasing the eccentricity and inclination angle, respectively. At the same time, the increment in the horizontal displacement due t
... Show MoreThis paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation
... Show MoreObjectives: The study aims: (1) To determine effectiveness of instructional health education vascular access on hemodialysis patients' knowledge, (2) To find out the association between effects of instructional health education vascular access and demographic characteristics of (age, gender and educational level). Methodology: A quasi experimental study –control study design is carried out at AL-Hussein Teaching Hospital in AL-Nasiriyah City, from 3November,2015 to 2 June, 2016. A non-probability (Purposive sample) of (80) patients with vascular access devices on maintenance hemodialysis patients divided int