In this study, Zinc oxide nanostructures were synthesized via a hydrothermal method by using zinc nitrate hexahydrate and sodium hydroxide as a precursor. Three different annealing temperatures were used to study their effect on ZnO NSs properties. The synthesized nanostructure was characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), Atomic force microscope (AFM), and Fourier Transform Infrared Spectroscopy (FTIR). Their optical properties were studied by using UV -visible spectroscopy. The XRD analysis confirms that all ZnO nanostructures have the hexagonal wurtzite structure with average crystallite size within the range of (30.59 - 34.52) nm. The crystallite size increased due to the incensement of annealing temperature. FESEM analysis indicates that ZnO has hexagonal shape of cylindrical pores, plate-like nanocrystals and Nanorods. AFM analysis shows that the average surface roughness of ZnO Nanostructures increases from 3.96 to 19.1 nm with the increase of annealing temperature. The FTIR peaks indicate successful preparation of ZnO Nanostructures. The FTIR method was used to analyses the chemical bonds which conformed the present of the Zn-O group in the region between (400-500) cm-1. The UV-visible showed a red shift in the absorption spectra related to the shift in the energy gap related to increase in the particle size. the band gap energy has been calculated from the optical absorption spectra. The annealing process has been fond more effective on the value of energy gap. As the annealing temperature increases, the value of energy gap, increases as well; from (3.12to 3.22) eV. The prepared Nanostructure is used for antibacterial property. It shows strong antibacterial activity against S. aureus and P.aeuruginosa bacteria by the agar disc diffusion method. The white precipitate of ZnO NSs has superior antibacterial activity on gram-positive (S. aureus) than the gram-negative (P.aeuruginosa) bacteria.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThis paper describes a new finishing process using magnetic abrasives were newly made to finish effectively brass plate that is very difficult to be polished by the conventional machining processes. Taguchi experimental design method was adopted for evaluating the effect of the process parameters on the improvement of the surface roughness and hardness by the magnetic abrasive polishing. The process parameters are: the applied current to the inductor, the working gap between the workpiece and the inductor, the rotational speed and the volume of powder. The analysis of variance(ANOVA) was analyzed using statistical software to identify the optimal conditions for better surface roughness and hardness. Regressions models based on statistical m
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract. In this work, Bi2O3 was deposited as a thin film of different thickness (400, 500, and 600 ±20 nm) by using thermal oxidation at 573 K with ambient oxygen of evaporated bismuth (Bi) thin films in a vacuum on glass substrate and on Si wafer to produce n-Bi2O3/p-Si heterojunction. The effect of thickness on the structural, electrical, surface and optical properties of Bi2O3 thin films was studied. XRD analysis reveals that all the as deposited Bi2O3 films show polycrystalline tetragonal structure, with preferential orientation in the (201) direction, without any change in structure due to increase of film thickness. AFM and SEM images are used to investigate the influences of film thickness on surface properties. The optical measur
... Show MoreIn this work, the elemental constituents of smoker and nonsmoker
teeth samples of human were analyzed by Laser induced breakdown
spectroscopy method (LIBS). Many elements have been detected in
the healthy teeth samples, the important once are Ca, P, Mg, Fe, Pb
and Na. Many differences were found between (female and male)
teeth in Ca, P, Mg, Na and Pb contents. The concentrations of most
toxic elements were found significantly in the smoker group. The
maximum concentrations of toxic elements such as Pb, Cd and Co
were found in older male age above 60 year. Also, it was found that
the minimum concentrations of trace elements such as Ca, P and Na
exist in this age group. From these results it is clear that the