In the current study, haemoglobin analytes dissolved in a special buffer (KH2PO4(1M), K2HPO4(1M)) with pH of 7.4 were used to record absorption spectra measurements with a range of concentrations from (10-8 to 10-9) M and an absorption peak of 440nm using Broadband Cavity Enhanced Absorption Spectroscopy (BBCEAS) which is considered a simple, low cost, and robust setup. The principle work of this technique depends on the multiple reflections between the light source, which is represented by the Light Emitting Diode 3 W, and the detector, which is represented by the Avantes spectrophotomer. The optical cavity includes two high reflectivity ≥99% dielectric mirrors (diameter 25mm, radius of curvature 100mm) and a quartz cuvette 1 cm to put the samples in the system. This system is also composed of some lenses, aires, and optical fibres to transfer the light from the light source to the optical cavity and after that to the detector. This setup is considered ~3-fold more sensitive when it is compared with another spectroscopic technique as it reduces the effect of noise due to fluctuations in the light intensity. Additionally, the theoretical study estimated the absorption spectra of the haemoglobin concentrations using Table Curve 2D software. The absorption spectra curve was fitted using a suitable curve-fitting equation for these spectra, which was represented by the Gaussian function. The similarity of the theoretical and practical spectra demonstrated that the estimated models can replace the experimental measurements, which leads to a reduction in the cost and time required for the absorption spectroscopy measurements
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreGroundwater is an important source of fresh water especially in countries having a decrease in or no surface water; therefore itis essential to assess the quality of groundwater and find the possibility of its use in different purposes (domestic; agricultural; animal; and other purposes). In this paper samples from 66 wells lying in different places in Baghdad city were used to determine 13 water parameters, to find the quality of groundwater and evaluate the possibility of using it for human, animal and irrigation by calculating WQI, SAR, RSC and Na% and TDS indicators. WQI results showed that the groundwater in all wells are not qualified for human use, while SAR and RSC indicated that most samples are suitable for irrigation use, and
... Show MoreOften requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the
... Show MoreAbstract:
Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality managemen
... Show MoreKE Sharquie, AA Noaimi, MM Al-Salih, Saudi Medical Journal, 2008 - Cited by 56
S Khalifa E, N Adil A, AS Mazin M…, 2008