Surface structural features and optical analysis of nanostructured Cu-oxide thin film coatings coated via the sol-gel dip coating method
...Show More Authors
A simple and novel method was developed by combination of dispersive liquid-liquid microextraction with UV spectrophotometry for the preconcentartion and determination of trace amount of malathion. The presented method is based on using a small volume of ethylenechloride as the extraction solvent was dissolved in ethanol as the dispersive solvent, then the binary solution was rapidly injected by a syringe into the water sample containing malathion. The important parameters, such the type and volume of extraction solvent and disperser solvent, the effect of extraction time and rate, the effect of salt addition and reaction conditions were studied. At the optimum conditions, the calibration graph was linear in the range of 2-100 ng mL-1 of ma
... Show MoreIn this work, the possibility of a multiwavelength mode-locked fiber laser generation based on Four-Wave Mixing (FWM) induced by Fe2O3-SiO2 nanocomposite material is investigated for the first time. A multiwavelength mode-locked pulses fiber laser are generated from Ytterbium–doped fiber laser (YDFL) due to the combined action of high nonlinear absorption and high refractive coefficients of Fe2O3-SiO2 nanocomposite incorporated inside YDFL ring cavity. Up to more than 20 lasing lines in the 1040–1070 nm band with an equally lines separation of ~0.6 nm have been observed by just simple variation of passive modulation of the state of the polarization and the pump power altogether. Moreover, a passively mode-locked operation of YDFL laser
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSuperconducting thin films of Bi1.6Pb0.4Sr2Ca2Cu2.2Zn0.8O10 system were prepared by depositing the film onto silicon (111) substrate by pulsed laser deposition. Annealing treatment and superconducting properties were investigated by XRD and four probe resistivity measurement. The analysis reveals the evolution of the minor phase of the films 2212 phase to 2223 phase, when the film was annealed at 820 °C. Also the films have superconducting behavior with transition temperature ≥90K.
In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreThe specialist researcher fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic social phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective and examine the relationship between The dissert and the city within economic says which are cover the social analysis ,and determinate the analysis objects which clearly in this dualism model ,between the state and economic bas
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show More