High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ). The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and image sensing.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Transitional cell carcinomas (TCC) of the bladder are a major health problem. Recently, some studies link high risk Human papilloma viruses' type 16 and type 18 with bladder carcinoma.
Materials and methods: Fifty formalin fixed, paraffin embedded tissues with TCC of the bladder from Specialized Surgical Hospital in Baghdad were included in this study. In addition, ten
apparently normal bladder autopsies were collected from the Forensic Medicine Institute Archives and used as control group. Tissue blocks were sectioned and sticked on charged slides and used for the detection of HPV-16 and HPV-18.
Results: The expression of HPV-16 and HPV-18 DNA signals in TCC of the bladder tissues in the&nbs
Thermal and catalytic pyrolysis of waste plastics in an inert atmosphere has been regarded as a creative method, since pyrolysis can convert plastics waste into hydrocarbons that can be used either as fuels or as a source of chemicals.
Natural Iraqi kaolin clay was used to synthesis the NaX nano- zeolite by hydrothermal conditions with average particle size equal to 77.63nm.Thermal decomposition kinetics of high-density polyethylene (HDPE) in the absence and presence of catalysts nano NaX Zeolite was investigated. Thermal and catalytic degradation of HDPE was performed using a thermogravimetric analyzer in nitrogen atmosphere under non-isothermal conditions 4, 7 and 10 °C/min heating rates were employed in thermogravimetric anal
... Show MoreIn this study, the electron energy distribution function (EEDF), the electron swarm parameters , the effective ionization coefficients, and the critical field strength (dielectric strength) in binary He-H2 gas mixture which is used as cryogenic for high-temperature superconducting power applications, are evaluated using two-term solution of the Boltzmann equation over the range of E/N ( the electric field to gas density) from 1 to 100 Td ( 1 Td=10-17 Vcm2) at temperature 77 K and pressure 2MPa, taking into account elastic ( momentum transfer) and inelastic cross-sections. Using the electron energy distribution function (EEDF) electron swarm parameters (electron drift velocity, mean electron e
... Show MoreThe study aimed to determine the effect of soybean meal on the histological
structure and some functional parameters of the thyroid gland was investigated in
this study. For this purpose, 24 white male rats were divided into four groups each
of six rats, as following (G1): normal control rats, at the prepubertal life stage, were
dissected after 40 days from the weaning (i.e., from Postnatal Day "PND" 21),
(G2): prepubertal rats, were treated with high dose of soybean meal "40% of daily
diet" for 40 days after the weaning, (G3): normal control rats, at the postpubertal
stage, were dissected after 40 days from the puberty (i.e., from PND 60), (G4):
postpubertal rats, were treated with high dose of soybean meal (40%)
Systemic lupus erythematosus (SLE) is a heterogeneous autoimmune disease characterized by elevated levels of circulating anti-nuclear autoantibodies and interferon-alpha (INFs-α). Interferon regulatory factor-5 (IRF5) plays an important role in the induction of type I interferon and pro-inflammatory cytokines, and participates in the SLE pathogenesis. This study aimed to investigate the role of IRF5 gene expression levels in a sample of SLE Iraqi patients and its correlation with disease activity, and to identify its diagnostic ability as a biomarker reflecting disease activity. Blood samples were taken from 45 participants diagnosed with SLE cases classified according to the American College of Rheumatology (ACR) criteria. T
... Show More