The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
This research focuses on the synthesis of carbon nanotube (CNT) and Poly(3-hexylthiophene) (P3HT) (pristine polymer) with Ag doped (CNT/ P3HT@Ag) nanocomposite thin films to be utilised in various practical applications. First, four samples of CNT solution and different ratios of the polymer (P3HT) [0.1, 0.3, 0.5, and 0.7 wt.%] are prepared to form thin layer of P3HT@CNT nanocomposites by dip-coating method of Ag. To investigate the absorption and conductivity properties for use in various practical applications, structure, morphology, optical, and photoluminescence properties of CNT/P3HT @Ag nanocomposite are systematically evaluated in this study. In this regard, the UV/Vis/NIR spectrophotometer in the wavelength range of 350 to 7
... Show MoreThis study objective is to identify the visual pollution in Karrada district main streets as an example of main streets in Baghdad, the public opinion about each pollutants, solutions to reduce and eliminate the pollution were suggested as well. In order to accomplish this objective different methods were used, 16 pollutants were selected, pictures of each pollutants were taken and a questioner were distributed randomly for 270 people to evaluate the public opinion with statistical methods. Garbage, their disposal and storage areas took the first two places as the highest offensive pollutants. The people showed that they find long lines of vehicles, debris and generators appearance ranked third, fourth and fifth respectively .This resear
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MorePolyaniline membranes of aniline were produced using an electrochemical method in a cell consisting of two poles. The effect of the vaccination was observed on the color of membranes of polyaniline, where analysis as of blue to olive green paints. The sanction of PANI was done by FT-IR and Raman techniques. The crystallinity of the models was studied by X-ray diffraction technique. The different electronic transitions of the PANI were determined by UV-VIS spectroscopy. The electrical conductivity of the manufactured samples was measured by using the four-probe technique at room temperature. Morphological studies have been determined by Atomic force microscopy (AFM). The structural studies have been measured by (SEM).
This paper deals with calculate stresses in Knee-Ankle-Foot-Orthosis as a result of the effect vibration during gait cycle for patient wearing KAFO .Experimental part included measurement interface pressure between KAFO and leg due to action muscles and body weigh on Orthosis. also measurement acceleration result from motion of defected leg by accelerometer .Results of Experimental part used input in theoretical part so as to calculate stresses result from applying pressure and acceleration on KAFO by engineering analysis program ANSYS 14.Resultes show stresses values in upper KAFO greater than lower KAFO that is back to muscles more effective in thigh part lead to recoding pressure higher than pressure in shank part.
Neonatal sepsis refers to the bacterial bloodstream infections of the newborn during the neonatal period as usually the first twenty-eight days of life. The current study was done in the laboratories of AL-Batool Teaching Hospital for Gynecology and Pediatrics in Baqubah, Diyala Governorate, including 140 blood specimens collected from the neonates admitted to the hospital with suspected sepsis, the ages of the both groups was ranged from 1 day to 28 days. Out of the total cultured samples, 32.14% (45 of 140) were positive and 67.86% (95 of 140) were negative blood culture. 45 of 140 samples were negative to the blood culture chosen as control group. The results showed highest isolates were Coagulase Negative Staphylococcus (CoNS) 19 (42.2%
... Show MoreHeterocyclic compounds are employed in many applications, and numerous researchers have created liquid crystals by adding heterocyclic to the structures of these molecules. This work includes the synthesis and characterization of new compounds that contain 5H-thiazolo [4,3-b][1,3,4] thiadiazol united in multiple steps, starting with the synthesis of the aldehyde compound [I] by reaction chloro ethyl acetate with 4-hydroxybenzaldehyde in the presence of ethanol and potassium carbonate, followed by reactions with thiosemicarbazide, mercapto acetic acid in sulphuric acid to produce compound [II] then reflux compound [II] with hydrazine hydrate to product compound [III], after that reaction the later compound with nalkoxybenzaldehyde [IV]n and
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More