A nano-sensor for nitrotyrosine (NT) molecule was found by studying the interactions of NT molecule with new B24N24 nanocages. It was calculated using density functionals in this case. The predicted adsorption mechanisms included physical and chemical adsorption with the adsorption energy of −2.76 to −4.60 and −11.28 to −15.65 kcal mol−1, respectively. The findings show that an NT molecule greatly increases the electrical conductivity of a nanocage by creating electronic noise. Moreover, NT adsorption in the most stable complexes significantly affects the Fermi level and the work function. This means the B24N24 nanocage can detect NT as a Φ–type sensor. The recovery time was determined to be 0.3 s. The sensitivity of pure BN nanocages could be improved without additional expensive structural manipulations. After the NT had been absorbed into the nanocage, UV–Vis spectrum analysis revealed that the transmission wavelength shifted significantly toward 390.07 nm. Hence, a redshift occurs when the NT molecule gets near the B24N24 nanocage. According to the present study model, B24N24 nanocages are possibly promising devices for NT sensors based on their electronic and structural properties.
This paper discusses a comparative study to relate parametric and non-parametric mode decomposition algorithms for response-only data. Three popular mode decomposition algorithms are included in this study: the Eigensystem Realization Algorithm with the Natural Excitation Technique (NExT-ERA) for the parametric algorithm, as well as the Principal Component Analysis (PCA) and the Independent Component Analysis (ICA) for the non-parametric algorithms. A comprehensive parametric study is provided for (i) different response types, (ii) excitation types, (iii) system damping, and (iv) sensor spatial resolution to compare the mode shapes and modal coordinates of using a 10-DOF building model. The mode decomposition results are also compared using
... Show MoreThe aim of the present research is to study different protein fractions in sera of children and adolescent with β –thalassemia major and minor and to compare the results with that of healthy control.One hundred fifty children and adolescents were enrolled in this study,including 50 patients with β- thalassemia major , 50 patients with β- thalassemia minor as pathological control group and another apparently 50 healthy individuals as a control group. The age of all studied groups ranged from (4-18)years.Total protein, albumin and immunoglobulins were estimated in sera of all subjects. A Significant decrease was found in the total protein and albumin&nb
... Show MoreIn this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica
The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each
... Show MoreLong memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MoreIn this work, ZnO nanostructures for powder ZnO were synthesized by Hydrothermal Method. Size and shape of ZnO nanostructureas can be controlled by change ammonia concentration. In the preparation of ZnO nanostructure, zinc nitrate hexahydrate [Zn(NO3)2·6H2O] was used as a precursor. The structure and morphology of ZnO nanostructure have been characterized by scanning electron microscopy (SEM), atomic force microscopy (AFM), X-ray diffraction (XRD). The synthesized ZnO nanostructures have a hexagonal wurtzite structure. Also using Zeta potential and Particle Size Analyzers and size distribution of the ZnO powder
The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More