In this work, a method for the simultaneous spectrophotometric determination of zinc which was precipitated into deionized water that is in a commercial distribution systems PVC pipe, is proposed using UV-VIS Spectrophotometer. The method based on the reaction between the analytes Zn2+ and 2-carboxy-2-hyroxy-5-sulfoformazylbenze (Zincon) at an absorption maximum of 620nm at pH 9-10. This ligand is selective reagent. Since the complex is colored (blue), its stoichiometry can be established using visible spectrometry to measure the absorbance of solutions of known composition. The stoichiometry of the complex was determined by Job’s method and molar ratio method and found to be 1:2 (M: L). A series of synthetic solution containing different concentrations of zinc were used to check the prediction ability of the complexation. Water quality samples collected a 100cm PVC system of drinking water in three sizes from different country full with deionized water for different time.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
The assessment of a river water’ quality is an essential procedure of monitor programs and is used to collect basic environmental data. The management of integrated water resources in a sustainable method is also necessary to allow future generations to meet their water needs. The main objective of this research is to assess the effect of the Diyala River on Tigris River water quality using Geographic Information System (GIS) technique. Water samples have been collected monthly from November 2017 to April 2018 from four selected locations in Tigris and Diyala Rivers using the grab sampling method. Fourteen parameters were studied which are Turbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivi
... Show MoreThe assessment of a river water’ quality is an essential procedure of monitor programs and isused to collect basic environmental data. The management of integrated water resources in asustainable method is also necessary to allow future generations to meet their water needs. Themain objective of this research is to assess the effect of the Diyala River on Tigris River waterquality using Geographic Information System (GIS) technique. Water samples have beencollected monthly from November 2017 to April 2018 from four selected locations in Tigris andDiyala Rivers using the grab sampling method. Fourteen parameters were studied which areTurbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, TotalDissolved Solids,
... Show MoreThe Middle East fat tailed sheep Ovis aries L. examined within the boundaries of Al-Anbar province, western Iraq was found to acquire seven species of ixodid ticks namely, Hyalomma
anatolicum, H. excxavatum, H. marginatum turanicum, H. detritum, Hyalomma sp., Rhipicephalus turanicus and R. s. sanguineus. The results discussed with the pertinent
literature.
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show More