In this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) images show that the CSNPs- Linker- alkaloids compound have two shapes in the nano dimension: spherical particles and nanotubes, which may be due to nuclei and growth processes, respectively. The energy gap calculated from the photoluminescence spectrum is equal to 2.5 eV. The Hall effect measurements prove that the synthesized CSNPs- Linker-alkaloids compound is a p-type semiconductor. The cycle voltammetry technique was used to detect the Zn ions in different concentrations in the water by modifying the electrochemical system's glassy carbon electrode (GCE) with a CSNPs-Linker-alkaloids compound. The modified electrode was used to detect Zn ions in the range of (1-8) ppm, which causes water pollution. The best sensor sensitivity R² equals 0.997 for oxidation and 0.993 for reduction. This modified electrode (GCE /CSNPs- Linker-alkaloids) acts as a good biosensor for heavy metals detection in water as well as for biophysics applications.
An essential component of food production is nitrogen (N). Crops waste about half of the nitrogen fertilizer input, which is then released into the atmosphere as gas emissions or polluting of aquatic groups. It is necessary to reach manufacture stages that promote world food security in the absence of compromising quality. safety of the environment. It is estimated that by 2050, N pollution levels will have risen 150% from 2010 levels, with the The agricultural sector is responsible for 60% of this growth. In this review fertilizer Nitrogen should take into account while discussing air pollution caused by gases that contain nitrogen, which might result in issues like the greenhouse effect. Nopoint pollution, the involvement of farme
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreIn this work, prepared new ligand namely 5-(2,4-dichloro-phenyl)-1,3,4-oxadiazole-2-(3H)-thion, was obtained from the 2,4-dichlorobenzoyl chloride with hydrazine, after that reaxtion with CS2/KOH in methanol.
SYNTHESIS AND CHARACTERISATION OF NEWCo(II), Zn(II) AND Cd(II) COMPLEXES DERIVED FROM OXADIAZOLE LIGAND AND 1,10-PHENANTHROLINE AS Co-LIGAND
The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show More