Abstract :- In this paper, silver nanoparticles had been prepared by chemical reduction method. Many tests had been done to it such as UV-Visible spectrophotometer, XRD, AFM&SEM test. finally an attempt had been done to get the optimum condition to control the grain size of silver Nanoparticles by variation the heating period and other parameters which has an effect in silver Nanoparticles synthesis process. in this method we can get a silver nanoparticles in the size range from 52 to 97 nm.
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe concept of forming the living space in the American strategic thought has an
important position it is regarded as an strategic movement that it supports the American
United States with the huge capabilities in its own concern that enables it to approach of
American administration , we find that of different historical periods it works to establish that
the geopolitical dimension which is accompanied with the ability of American response for
the evens that in its own turn enables the American united states to seize the growing chances
in the global strategic environment This study includes five chapters :
- Chapter one: The idea of living space.
- Chapter two: Geopolitical dimension of living space theory.
-
In this review, previous studies on the synthesis and characterization of the metal Complexes with paracetamol by elemental analysis, thermal analysis, (IR, NMR and UV-Vis (spectroscopy and conductivity. In reviewing these studies, the authors found that paracetamol can be coordinated through the pair of electrons on the hydroxyl O-atom, carbonyl O-atom, and N-atom of the amide group. If the paracetamol was a monodentate ligand, it will be coordinated by one of the following atoms O-hydroxyl, O-carbonyl or N-amide. But if the paracetamol was bidentate, it is coordinated by atoms (O-carbonyl and N-amide), (O-hydroxyl and N-amide) or (O-carbonyl and O-hydroxyl). The authors also found that free paracetamol and its complexes have antimicrobial
... Show MoreA new series of N-acyl hydrazones (4a-g) derived from indole-3-propionic acid (IPA) were synthesized. These N-acyl hydrazones were prepared by the reaction of 3-(1H-indol-3-yl) propane hydrazide and aldehyde in the existence of glacial acetic acid as a catalyst. 1HNMR and FT-IR analyses were used to identify the synthesized compounds and they were in vitro evaluated as antibacterial agents against six different types of microorganisms by using well diffusion method. All the tested N-acyl hydrazones (4a-g) displayed moderate activity against the Gram-negative E.coli, comparable to that of Amoxicillin. Some of the tested N-acyl hydrazones also exhibited intermediate activity ag
... Show MoreIn this study, chemical oxidation was employed for the synthesis of polypyrrole (PPy) nanofiber. Furthermore, PPy has been subjected to treatment using nanoparticles of neodymium oxide (Nd2O3), which were produced and added in a certain ratio. The inquiry centered on the structural characteristics of the blend of polypyrrole and neodymium oxide after their combination. The investigation utilises X-ray diffraction (XRD), FTIR, and Field Emission Scanning Electron Microscopy (FE-SEM) for PPy, 10%, 30%, and 50% by volume of Nd2O3. According to the electrochemical tests, it has been noted that the nanocomposites exhibit a substantial amount of pseudocapacitive activity.
In this investigation, water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals), utilizing N-acetyl cysteine as a stabilizer, were prepared to assess their potential in differentiating between DNA extracted from pathogenic bacteria (e.g. Escherichia coli isolated from urine specimen) and intact DNA (extracted from blood of healthy individuals) for biomedical sensing prospective. Following the optical characterization of the synthesized QDs, the XRD analysis illustrated the construction of NAC-CdTe-QDs with a grain size of 7.1 nm. The prepared NAC-CdTe-QDs exhibited higher PL emission features at of 550 nm and UV-Vis absorption peak at 300 nm. Additionally, the energy gap quantified via PL and UV–Vis were 2.2 eV
... Show More