Water quality sensors have recently received a lot of attention due to their impact on human health. Due to their distinct features, environmental sensors are based on carbon quantum dots (CQDs). In this study, CQDs were prepared using the electro-chemical method, where the structural and optical properties were studied. These quantum dots were used in the environmental sensor application after mixing them with three different materials: CQDs, Alq3 polymer and CQDs and Alq3 solutions using two different methods: drop casting and spin coating, and depositing them on silicon. The sensitivity of the water pollutants was studied for each case of the prepared samples after measuring the change in resistance of the samples at a temperature of 30 oC. Through the results, it was found that the highest sensitivity of sample 3 to the carbon continuous dot was in the case of the contaminant fructose and was 99.55%, while the highest sensitivity of sample 4 was for the one sensitive to the contaminant (mercury chloride) and was 81. As for sample 1, the highest sensitivity was in the case of detecting the contaminant lead chloride and was 80. The results showed that the best sensor was obtained using a spin-coating technique when the solution sample of CQDs+Alq3 was placed on a silicon slide in fructose and the sensitivity was 200%. This demonstrates the importance of quantum dots in measuring the sensitivity of water pollutants. The thin film thickness was measured to be 500 nm.
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreThe corrosion inhibition of low carbon steel in1N HCl solution in the presence of peach juice at temperature (30,40,50,and 60)°C at concentration ( 5, 10, 20, 30, 40and 50 cm3/L)were studied using weight loss and polarization techniques. Results show that the inhibition efficiency was increased with the increase of inhibitor concentration and increased with the increase of temperature up to 50ºC ,above 50ºC (i.e. at 60 ºC) the values of efficiency decreases. Activation parameters of the corrosion process such as activation energies, Ea, activation enthalpies, ΔH, and activation entropies, ΔS, were calculated. The adsorption of inhibitor follows Langmuir isotherm. Maximum inhibition efficiency obtained was a bout 91% at 50ºC in the
... Show MoreIn this study, the water treatment plants located on the Tigris River within Baghdad city were subjected to qualitative and quantitative assessments. Based on location, the plants from upstream to downstream are Al-Karkh, East Tigris, Al-Karamah, Al-Wathbah, Al-Wehdah, Al-Kadiseyah, Al-Dora, and Al-Rashid. Data from 2009 to 2020 on the turbidity, total dissolved solids, Alkalinity, hardness, chloride, calcium, and temperature were used in the qualitative assessment while data on the treated water production and population served were used in the quantitative assessment. The above Data was acquired from the Municipality of Baghdad. The turbidity was mainly used as a fair gauge to assess the performance of the water treatment plants in Baghda
... Show MoreExposure assays to magnetized water have so far revealed striking results. The present study was conducted to determine the effects of magnetized water treatment with in different intensities 500 , 1000 and 1500 Gauss on some biological aspects for species of freshwater Gastropod Lymnaea lagotis (Schrank, 1803) which important species in faun of aquatic habitats of Iraq. This species are considered a component of the food chain. The obtained results compared with these species which lived in the river(control). Result of these experiments showed increased significance the shell size (shell high, shell aperture length, shell aperture width and shell width) for L. lagotis with increased intensity magnetized water such as treated water with 1
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe aim of this paper, study the effect of carbon nanotubes on the electrical properties of polyvinylchloride. Samples of polyvinylchloride carbon nanotubes composite prepared by using hot press technique. The weight percentages of carbon nanotubes are 0,5,10 and 20wt.%. Results showed that the D.C electrical conductivity increases with increasing of the weight percentages of carbon nanotubes. Also, the D.C electrical conductivity changed with increase temperature for different concentrations of carbon nanotubes. The activation energy of D.C electrical conductivity is decreased with increasing of carbon nanotubes concentration.