Owing to their cost-effectiveness and the natural abundance of magnesium, magnesium-ion batteries (MIBs) were introduced as encouraging alternatives to Lithium-ion batteries. Following the successful synthesis of carbon nano-tube, its B and N doped derivatives which were doped with B and N enjoyed the attention of researchers as novel anode materials (AM) for MIBs. Here, we investigated a BC2N nano-tube (BC2NNT) as an encouraging AM for MIBs. To have a deeper understanding of the electrochemical properties, cycling stability, specific capacity (SC) and the adsorption behavior of this nano-tube, first-principles density functional theory computations were performed. By performing NMR calculations, we identified two types of non-aromatic hexagonal rings, namely B2C2N2 (I) and BC4N (II). Magnesium was adsorbed onto I with the adsorption energy of −40.38 kcal/mol and on II with the adsorption energy −20.15 kcal/mol. The SCs were as high as 783 mAh/g. The predicted average open-circuit voltage for BC2NNT was 1.94 V, which was greater than that of other 2D materials. The findings demonstrated the possibility of utilizing the BC2NNT as an AM for MIBs. The results can provide useful insights into the design of boron-carbon-nitrogen-based AMs for MIBs.
Ajloun Governorate is considered the smallest governorate in Jordan in terms of area, and its population density rises to 472.2 people/ km2 and is distributed among five municipalities. The Al-Shafa municipality is one of these municipalities. Al-Shafa is rich in its natural and human resources, and the first municipal council was established in it in 2001.
This study seeks to achieve the following general objective: inventory the natural and human resources that Al-Shafa enjoys, and highlight the role of Al-Shafa municipality in achieving and settling sustainable development for the local community. Certain content, which are: the comprehensive approach to geographical reality, the descriptive
... Show MoreIn the present work the performance of semifluidized bed adsorber was evaluated for removal of phenolic compound from wastewater using commercial activated carbon as adsorbent. P-chlorophenol (4-Chlorophenol) and o-cresol (2-methylphenol) was selected as a phenolic compound for that purpose. The phenols percent removal, in term of breakthrough curves were studied as affected by hydrodynamics limitations which include minimum and maximum semifluidization velocities and packed bed formation in the column by varying various parameters such as inlet liquid superficial velocity (from Uminsf to 8Uminsf m/s), and retaining grid (sometimes referred to as adsorbent loading) to initial static bed height ratio (from 3-4.5). In
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreA nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.
In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreGiven the paucity and toxicity of available drugs for leishmaniasis, coupled with the advent of drug resistance, the discovery of new therapies for this neglected tropical disease is recognised as being of the utmost urgency. As such antimicrobial peptides (AMPs) have been proposed as promising compounds against the causative Leishmania species, insect vector-borne protozoan parasites. Here the AMP temporins A, B and 1Sa have been synthesised and screened for activity against Leishmania mexicana insect stage promastigotes and mammalian stage amastigotes, a significant cause of human cutaneous disease. In contrast to previous studies with other species the activity of these AMPs against L. mexicana amastigotes was low. This suggests that ama
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More