Colloidal silver nanoparticles were prepared by single step green synthesis using aqueous extracts of the leaves of thyme as a function of different molar concentration of AgNO3 (1,2,3,4 mM(. The Field Emission Scanning Electron Microscopy (FESEM), UV-Visible and X-ray diffraction (XRD) were used to characterize the resultant AgNPs. The surface Plasmon resonance was observed at wavelength of 444 nm. The four intensive peaks of XRD pattern indicate the crystalline nature and the face centered cubic structure of the AgNPs. The average crystallite size of the AgNPs ranged from 18 to 22 nm. The FESEM image illustrated the well dispersion of the AgNPs and the spherical shape of the nanoparticles with a particle size distribution be
... Show MoreThe photonconductor detectors CdSe:Cu was fabricated as a thin film of (1 μm) in thickness using vacuum evaporation technique. doping with copper was made using vacuum annealing at 350oC under argon atmosphere . The spectral responsivity and spectral detectivity of the detector were determined as a function of incident wavelength on the sample. A remarkable improvement in performance was absorbed for the specimen, which doping with (1-5 wt%) Cu.
The spectral response increases with increasing of wavelength for incident radiation to maximum value, after that , it reduced sharply . There is a shifting for peak responsivity indirect of higher wavelength. The detectivity was increased with doping but its decreased as the concentration in
The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreThe research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.
Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More