Abstract: In this paper, a U-shaped probe with a curvature diameter of half a centimeter was implemented using plastic optical fibers. A layer of the outer shell of the fibers was removed by polishing to a D-section. The sensor was tested by immersing it in a sodium chloride solution with variable refractive index depending on solution concentrations ranging from 1.333 to 1.363. In this design, the sensor experienced a decrease in its intensity as the concentration of the solution increased. The next step The sensor was coated with a thin layer of gold with a thickness of 20 nm, and the sensor was tested with the same solutions which resulted in a shift in wavelengths where the shift in wavelength was 5.37 nm and sensitivity 179 nm / RIU. To study the effect of the thickness of the film, it was coated with a second layer of gold to make the total thickness 30 nm. The results showed an improvement in the sensitivity with increasing the thickness of the coating, to become 466.66 nm / RIU and the wavelength shift was 14 nm.
We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThe azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we
... Show MoreIntroduction: Infection control or hospital-acquired infections are the major concern of the health care system and agencies. Critical care nurses are on the first-line contact with the patients, so on, they are most vulnerable to acquired infections. It is really important to regularly check their knowledge and practices concerning infection control. Objectives: The study aims to identify the impact of years’ experience on nurses’ knowledge and practices concerning infection control in three hospitals and center (Baghdad teaching hospital, Ibn Al-Nafees hospital, and Ibn al-Bitar center) Methodology: Cross-sectional study was conducted, the study starting from 4th of July 2020 to 13th of November 2020. Non-probability (purposive) sampl
... Show MoreThe study aimed to detect the VrPIP2;7 gene using PCR approach, as well as to know the effect of the treatment with four increased melatonin concentrations of 50, 100, 150 and 200 ppm in addition to control treatment were 0 ppm on the gene expression of plasma membrane intrinsic proteins (PIP) genes in Vigna radiata L. plant exhibition for five periods of drought which is irrigation every 24 hours, 48 hours, 5 days, 10 days and every 15 days. The electrophoresis of agarose gel at a concentration of 2% showed one band when detecting the VrPIP2;7 gene with a sizeable 732 bp and using the 100 bp volume index. This gene was selected for sequencing study based on its importance as well as on the results of its gene expression. The sequencing of
... Show MoreBuilding numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr
Background: Pulpotomy is an accepted treatment for the management of cariously exposed pulps in symptom free primary molars to achieve one of the most important goals for Pedodontists, which is the retention of the pulpally involved deciduous teeth healthy until the time of normal exfoliation. The purpose of this study was to evaluate the relative success of pulpotec, formocresol and Mineral Trioxide Aggregate (MTA) in cariously exposed primary molar teeth, using clinical and radiographical examinations. Materials and methods: Thirty nine children with 45 primary molars requiring pulpotomy were selected in this study, 15 teeth treated by each type of pulpotomy medicament. Clinical and radiographical follow up for the patients was performed
... Show More