The present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, the average molecular weight increase and result in many
unique characteristics of the cometary tail.
The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThis paper describes a new finishing process using magnetic abrasives were newly made to finish effectively brass plate that is very difficult to be polished by the conventional machining processes. Taguchi experimental design method was adopted for evaluating the effect of the process parameters on the improvement of the surface roughness and hardness by the magnetic abrasive polishing. The process parameters are: the applied current to the inductor, the working gap between the workpiece and the inductor, the rotational speed and the volume of powder. The analysis of variance(ANOVA) was analyzed using statistical software to identify the optimal conditions for better surface roughness and hardness. Regressions models based on statistical m
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDiarrhea is one of the most commonly encountered minor ailments in the community pharmacies. It is associated with significant morbidity and mortality. However, the majority of pharmacists in Iraq did not manage diarrheal cases in a proper way. Therefore, the current study aimed to evaluate the benefit of a new mobile application (diarrhea management step by step) to improve the pharmacist's role in the management of diarrhea. The study was conducted from 21th September to 21th October 2021 using a pre-post design via a simulated patient (SP) technique. A validated diarrhea scenario was presented to each pharmacist by the SP twice, once before and the other after giving the mobile application to the pharmacist. Furthermore, pharmaci
... Show MoreThis paper presents the effect of Cr doping on the optical and structural properties of TiO2 films synthesized by sol-gel and deposited by the dip- coating technique. The characteristics of pure and Cr-doped TiO2 were studied by absorption and X-ray diffraction measurement. The spectrum of UV absorption of TiO2 chromium concentrations indicates a red shift; therefore, the energy gap decreases with increased doping. The minimum value of energy gap (2.5 eV) is found at concentration of 4 %. XRD measurements show that the anatase phase is shown for all thin films. Surface morphology measurement by atomic force microscope (AFM) showed that the roughness of thin films decrease with doping and has a minimum value with 4 wt % doping ratio.
A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
This study estimated seven heavy metals (Fe, Cu, Zn, Pb, Ni, Cd, Cr) in water (dissolved and particulate phase), sediments and some aquatic organisms including two species from aquatic plants (Ceratophyllum demersum&Phragmites australis); one species of clam (Psedontopeses euphratics) and two species from fish (Oreochromis aureus& Leuciscus vorax)in four sites within Mashroo AL- Musayyib channel project/ branch of Euphrates river, Babylon , medial of Iraq . This aims to show the concentration of these elements, their fate and the mechanisms of their transmission through the food chain in this lotic aquatic system ; also in addition to examining some physicochemical properties of ri
... Show More