In order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNNT toward SN compare to AlNNT. Also, the recovery time for SN to be desorbed from the Sc@GaNNT surface was found to be short, i.e., 4.4 s. Based on the energy decomposing analysis, the interaction between the SN and metal@nanotubes was of electrostatic nature, which is also called a cation-lone pair interaction.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreTo determine the relationship between chronic hepatitis B virus and autoimmune celiac disease, seventy five patients with chronic hepatitis B virus of ages (8-70) years have been investigated and compared to 50 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA and IgG by ELISA test and anti-endomysial antibodies IgA and IgG by IIFT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P< 0.01) .The prevalence of antiTtG IgA and IgG was 14.67% and 12.0% respectively.There was a highly significant difference (P<0.01) when compared between studied groups .While the prevalence of anti-en
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreBackground: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreG-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R
... Show MoreA simple, low cost and rapid flow injection turbidimetric method was developed and validated for mebeverine hydrochloride (MBH) determination in pharmaceutical preparations. The developed method is based on forming of a white, turbid ion-pair product as a result of a reaction between the MBH and sodium persulfate in a closed flow injection system where the sodium persulfate is used as precipitation reagent. The turbidity of the formed complex was measured at the detection angle of 180° (attenuated detection) using NAG dual&Solo (0-180°) detector which contained dual detections zones (i.e., measuring cells 1 & 2). The increase in the turbidity of the complex was directly proportional to the increase of the MBH concentration
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MoreIraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes
... Show More