Purpose: To use the L25 Taguchi orthogonal array for optimizing the three main solvothermal parameters that affect the synthesis of metal-organic frameworks-5 (MOF-5). Methods: The L25 Taguchi methodology was used to study various parameters that affect the degree of crystallinity (DOC) of MOF-5. The parameters comprised temperature of synthesis, duration of synthesis, and ratio of the solvent, N,N-dimethyl formamide (DMF) to reactants. For each parameter, the volume of DMF was varied while keeping the weight of reactants constant. The weights of 1,4-benzodicarboxylate (BDC) and Zn(NO3)2.6H2O used were 0.390 g and 2.166 g, respectively. For each parameter investigated, five different levels were used. The MOF-5 samples were synthesized using the solvothermal reaction method, and successful synthesis was confirmed with x-ray diffraction (XRD), microscopy, Fourier transform infrared spectroscopy (FTIR) and energy-dispersive x-ray spectroscopy (EDS). The DOC obtained via XRD served as a parameter of objective quality. Results: The optimum conditions that gave the highest DOC were synthesis temperature of 130 °C, duration of 60 h, and a vehicle volume of 50 mL, with optimum Brunauer-Emmett-Teller surface area (BET -SA) of 800 m2/g. All the three synthesis parameters significantly influenced the DOC of the synthesized MOF-5 (p < 0.05). Sub-optimal conditions resulted in distorted MOFs, products that deviated from MOF-5 specifications, or MOF-5 with low DOC. Conclusion: Based on DOC and BET-SA, the best conditions for synthesis of MOF-5 when using Taguchi OA, were temperature of 130 °C, duration of 60 h, and a DMF volume of 50 mL.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreA field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
Parents who give their sons arole in making parental decisions and admiring their views are the ones who build confidence and the feeling of competence within themselves and then their edgiest- rent with themselves becones better .
The (A.B) person-ality type is the core base of most psychological and educational studies because it is one of the most important subjects Concerning with the study of growth aspects whether they are physical, mental or Social. The present Study ains to measure the level of parental treatment among high School students, measure the level of (A) Personality type concept among them, recognize Statistically Significant differences in the level of parentaltreatment according gender variable and recognize the C
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.