In this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe study aimed to assess the frequency of invasive fungal infection in patients with respiratory diseases by conventional and molecular methods. This study included 117 Broncho alveolar lavage (BAL) samples were collected from patients with respiratory disease (79 male and 38 female) with ages ranged between (20-80) years, who attended Medicine Baghdad Teaching hospital and AL-Emamain AL-Khadhymian Medical City, during the period from September 2019 to April 2020. The results in PCR versus culture methods in this study showed that out of 117 samples of fungal infections 30(25.6 %) were detected by culture method, while the 24(20.5%) samples were detected by PCR technique, the most commonly diagnosed pathogenic fungi is Candida spp.
... Show MoreAromatic Schiff-bases are known to have antibacterial activity, but most of these compounds are sparingly soluble in water. The present work describes the synthesis of new Schiff-bases derived from branched aminosugars. Treatment of 3-Amino-3-Cyano-3-Deoxy-1,2:5,6-Di-O-Isopropylene-α-D-Allofuranose (1) with the aldehydes (2) under reflux in methanol afforded the Schiff-bases (3) in good yields. The new Schiff-bases were in accord with their NMR, IR spectral data and elemental analysis.
In the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate th
... Show MoreThe present study provides a new insight into valuable information on the diverse structure of the Anisakid population and discusses the limited species richness in the Nemipterus japonicus (Bloch,1791) (Perciformes, Nemiperidae). The fishing area consists of various locations in the Arabian Gulf (29°58 0 33 00 N48°28 0 20 E). A total of 315 marine fish were examined, (n=287) were infected. Larval stages (n= 763) encysted within the mesenteries peritoneum and viscera of fish organs were isolated, with a prevalence of 91.11% of infection and, the intensity was 2.65. Molecular analysis was carried out on thirty individuals who have examined the morphology and showed some appearance differences, by amplifying internal transcribed spacers
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show More