An oxidative polymerization approach was used to create polyaniline (PANI) and Fe2O3 /PANI nanoparticle combination. Various characterization approaches were used to investigate the structural, morphological, and Fe2O3 /PANI nanoparticle structures. The findings support the synthesis of polycrystalline nanoparticle PANI and Fe2O3 /PANI spherical nanoparticle composites. Gram-positive bacteria are tested for antibacterial activity. Various quantities of Nanoparticles of PANI and Fe2O3 /PANI nanoparticle composites were used to test Staph-aureus and gram-negative bacteria, E-coli, and candida species. PANI has antibacterial properties against all microorganisms tested. Fe2O3 /PANI nanoparticle composites, on the other hand, have higher antibacterial activity, as evidenced by the zone of inhibition. Bacterial inhibition zones are in S. aureus (positive), and E. coli are in good functioning order. With increasing concentrations of Fe2O3 /PANI nanoparticle composites, the inhibition zones of all bacteria are larger. Finally, the antimicrobial activity of Fe2O3 /PANI nanoparticle composite is characterized using a simplified mechanism based on electrostatic attraction. In this paper, a conductive polymer doped with iron nanoparticles was fabricated for the aim of testing it in the field of bacterial resistance.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreBackground: Denture fracture is one of the most common problems encountered by the patients and prosthodontists. The objective of present study was to evaluate the transverse strength of nylon denture base resin repaired by using conventional heat polymerized, autopolymerized and visible light cure {VLC} resins, surface treatment that used for repair and adjustment of insufficient nylon denture bases and in case of addition of artificial teeth. As these corrective procedures are common chair side procedures in dental clinic. Materials and methods: One hundred twenty nylon specimens were prepared by using metal patterns with dimension of (65x10x2.5 mm) length, width, and thickness respectively for transverse strength test while for tensile b
... Show MoreStudy showed structure of pecten oculi in the Kestrel Falco tinnunculus L.was
Pleated type and consisted of 17 folds which were thick. While in the Collared Dove
Streptopelia decaocto F. was Vaned type and consisted of 13 folds and it described
thin. The illustrated histological study of pecten oculi folds in the Kestrel and the
Collared Dove was composed of large number of capillaries, large blood vessels and
pigment cells which were few in Kestrel compare with the Collared Dove. The bridge
in the Kestrel and the Collared Dove pecten oculi was consisted of connective tissue,
many pigment cells, and contains on little capillaries and it linked the membrane to
the internal limiting membrane of the retina in the Kes