Graphene oxide GO was functionalized with 4-amino, 3-substituted 1H, 1, 2, 4 Triazole 5(4H) thion (ASTT) to obtain GOT. GOT characterized by FT-IR, XRD.via modification of the working electrode of the SPCE with the prepared nanomaterial (GOT) the effect of scan rate and pH on the determination of Amoxilline (AMOX) was studied using cyclic voltammetry. AMOX show various responses at pH ranging from 2 to 7 and also was observed sharp increase in the oxidation peaks in the pH 3. The formal potential (midpoint) for AMOX was highly pH-dependent. From the effect of scan rate, surface coverage concentration Γ of electroactive species the values of the electron transfer coefficient and the electron transfer constant rate ket was obtained as 5.39×
... Show MoreThis study was carried out at the Dept. Hortic. and Land.Gard., Coll. Agric. Eng.Sci., University of Baghdad during fall season of 2019-2020, in order to evaluate the effect of nutrient solution type under hydroponic system (NFT) on growth, yield and quality of broccoli Brassica oleracea var.italica. Two experiments were carried out which were the standard solution experiment (Cooper) and the alternative solution experiment (ABEER) prepared from fertilizers. Results revealed that the type of solution used in the hydroponics system had non significant effect on the leaves content of N,K, Mg, Fe, Cu, B, Chlorophyll, leaves number, root length, weight of the main heads, number of side heads were not significantly affected. 13nt, refl
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreBackground: This study report the corrosion behavior of commercially pure titanium and Ti-6Al-4V alloy samples without coating and with hydroxyapatite, partial stabilized zirconia and mixture of partial stabilized zirconia and hydroxyapatite coating and comparison between them through electrochemical polarization tests in 37 0 C Hank's solution. Materials and methods: Electrophoretic deposition technique (EPD) was used to achieve the coating from each one of three types of the coating materials (HAP, PSZ and mixture of 50% HAP and 50%PSZ) on Cp Ti and Ti-6Al-4V alloy samples. The electrochemical corrosion test was performed when samples were exposed to Hank's solution prepared in the laboratory and the polarization potential, corrosion rate
... Show MoreBackground: The development of orthodontic biomaterials that attract less biofilm has been a goal for decades. Adhesion and colonization of cariogenic streptococci are considered to play key roles in the development of enamel demineralization related to orthodontic materials. The aim of this study was to quantitatively evaluate the Mutans streptococci adhesion to coated orthodontic archwires (Epoxy and Teflon) and uncoated archwires (stainless steel and nickel-titanium) with respect to incubation time in the presence and absence of saliva. Material and Method: Six types of archwires stainless steel and nickel titanium with two type of coating (Epoxy, Teflon) were used in this study. Twelve specimens of each archwire were incubated in steri
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show More