Water quality sensors have recently received a lot of attention due to their impact on human health. Due to their distinct features, environmental sensors are based on carbon quantum dots (CQDs). In this study, CQDs were prepared using the electro-chemical method, where the structural and optical properties were studied. These quantum dots were used in the environmental sensor application after mixing them with three different materials: CQDs, Alq3 polymer and CQDs and Alq3 solutions using two different methods: drop casting and spin coating, and depositing them on silicon. The sensitivity of the water pollutants was studied for each case of the prepared samples after measuring the change in resistance of the samples at a temperature of 30 oC. Through the results, it was found that the highest sensitivity of sample 3 to the carbon continuous dot was in the case of the contaminant fructose and was 99.55%, while the highest sensitivity of sample 4 was for the one sensitive to the contaminant (mercury chloride) and was 81. As for sample 1, the highest sensitivity was in the case of detecting the contaminant lead chloride and was 80. The results showed that the best sensor was obtained using a spin-coating technique when the solution sample of CQDs+Alq3 was placed on a silicon slide in fructose and the sensitivity was 200%. This demonstrates the importance of quantum dots in measuring the sensitivity of water pollutants. The thin film thickness was measured to be 500 nm.
In this paper, we studied the travelling wave solving for some models of Burger's equations. We used sine-cosine method to solution nonlinear equation and we used direct solution after getting travelling wave equation.
In this paper, we study the peristaltic transport of incompressible Bingham plastic fluid in a curved channel. The formulation of the problem is presented through, the regular perturbation technique for small values of is used to find the final expression of stream function. The numerical solution of pressure rise per wave length is obtained through numerical integration because its analytical solution is impossible. Also the trapping phenomenon is analyzed. The effect of the variation of the physical parameters of the problem are discussed and illustrated graphically.
The excessive permanent deformation (rutting) in asphalt-concrete pavements resulting from frequent repetitions of heavy axle loads is studied in this paper. Rutting gradually develops with additional load applications and appears as longitudinal depressions in the wheel path. There are many causes of the rutting of asphalt roads, such as poor asphalt mixing and poor continuous aggregate gradation. All factors affecting the mixture resistance to permanent deformation must be discussed, and all must be properly considered to reduce the rutting propensity of asphalt-aggregate mixtures. In this study, several mixtures were produced with the most common techniques in rutting resistance (using the most effective additives for each mixture), and
... Show MoreIt is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree). This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method to prove th
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure sinusoidal amplitude range and
... Show MoreIn this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d
... Show MoreThe AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc
... Show More