In the present study, silver nanoparticles (AgNPs) were prepared using an eco-friendly method synthesized in a single step biosynthetic using leaves aqueous extract of Piper nigrum, Ziziphus spina-christi, and Eucalyptus globulus act as a reducing and capping agents, as a function of volume ratio of aqueous extract(100ppm) to AgNO3 (0.001M), (1: 10, 2: 10, 3: 10). The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AgNPs showed surface Plasmon resonance centered at 443, 440, and 441 nm for sample prepared using extract Piper nigrum, Ziziphus spina-christi, and Eucalyptus respectively. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of silver nanoparticles for all samples were prepared. The average crystallite size of the AgNPs was 20-45 nm. Morphology of the AgNPs were carried out using FESEM. Observations show that the AgNPs synthesized were spherical(Cluster) in shape. with diameters of 13 to 53 nm.
This paper is concerned with combining two different transforms to present a new joint transform FHET and its inverse transform IFHET. Also, the most important property of FHET was concluded and proved, which is called the finite Hankel – Elzaki transforms of the Bessel differential operator property, this property was discussed for two different boundary conditions, Dirichlet and Robin. Where the importance of this property is shown by solving axisymmetric partial differential equations and transitioning to an algebraic equation directly. Also, the joint Finite Hankel-Elzaki transform method was applied in solving a mathematical-physical problem, which is the Hotdog Problem. A steady state which does not depend on time was discussed f
... Show MoreIn this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.
Effects of Boron on the structure of chloroplasts membrane isolated from cauliflower are investigated , using light scattering technique. Results obtained in this study suggest that Boron in the concentration range (0.1-5 µm) can fluidize the lipids of the chloroplast membrane due to different extent. Mechanisms by which Boron can change the lipid fluidity is discussed. Furthermore, an experimental evidence is presented to show that2µM Boron can mediate conformational changes in the membrane –bound proteins of the cauliflower’s chloroplast.
It is an ideal area of research to examine related indicators to anticipate relative tectonic activities, where there is a broad range of geological formations with elements of different sedimentary rocks. This study includes assessing and evaluating the relative tectonic activities within the Sargalu area by using a morphometric approach, which involved the use of different indices that can explain and help understanding the geometry, development level, lithology, and structural disturbance on a sub-basinal level. The research was accomplished by using ArcGIS 10.5 hydrology tools to design the drainage system of each studied stream. The Advanced Spaceborne Thermal Emission Radiometer (ASTER) satellite imagery data and the Digital Elevat
... Show MoreThe present work aimed to study the effect of Grave's disease on the different tissues and organs of the body by using Wayne Thyrotoxicosis Diagnostic Index (WTDI) and Basel Metabolic Index (BMI). To reach such aim, (35) patients were involved (25 females and 10 males). A control group of (15) healthy individuals (10 females and 5 males) was selected for comparison , as well as , the following: 1- Wayne Thyrotoxicosis Diagnostic Index (WTDI) applied on patient group and control group under the supervision of specialist medical team , this index include (19) sign and symptom , the appearance of one of them may be lead to the others. The sings and symptoms of the index appear only on the patients. There is no Significant di
... Show MoreA simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and li
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More