The novel groups of organic chromophores containing triphenylamine (TPA) (ATP-I to ATP-IV) have been constructed by structural modification of electron donors with substitution biphenyl and bipyridine rings inserting a π-linkage. Density functional theory (DFT) and time-dependent type of it (TD-DFT) have been operated to study results of donating ability of TPA and spacer on absorption, geometrical, photovoltaic, and energetic attributes of these sensitizers. Structural attributes have been revealed that incorporation of TPA, acceptor and π bridge include a perfect coplanar conformation in TPA-III. Based on frequency computations and ground-state optimization, bandgap (Eg) energy, ELUMO, EHOMO have been determined. For enlightening maximum absorbance wavelength (λmax) and oscillator strength (f), TD-CAM-B3LYP computations have been employed. The absorption wavelength was shifted about ∼650 nm for TPA-III. Results indicate that among all dyes, TPA-III dye is considered the most promising candidates.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreTwo samples of (Ag NPs-zeolite) nanocomposite thin films have been prepared by easy hydrothermal method for 4 hours and 8 hours inside the hydrothermal autoclave at temperatures of 100°C. The two samples were used in a photoelectrochemical cell as a photocatalyst inside a cell consisting of three electrodes: the working electrode photoanode (AgNPs-zeolite), platinum as a cathode electrode, and Ag/AgCl as a reference electrode, to study the performance of AgNPs-zeolite under dark current and 473 nm laser light for water splitting. The results show the high performance of an eight-hour sample with high crystallinity compared with a four-hour sample as a reliable photocatalyst to generate hydrogen for renewable energies.
Abstract
This study aims at clarifying the current performance appraisal system in government units and the extent to which they contribute to the development of the performance of these units by evaluating and measuring the performance of these units on an ongoing basis to subject their services to an assessment and measurement process in order to improve the efficiency of these units to reach their objectives efficiently and effectively. (Iraqi hospitals) by trying to determine the possibility of the government accounting system in the process of evaluating performance, through the comparison of financial performance for successive years and different hospitals using the financial and non-financial model of the evaluati
... Show MoreZigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh
... Show More