Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.
The biological effects of pulsed N2-laser on the old world screw-worm fly, Chrysomya bezziana Villeneuve in the pupal stage were investigated. Different laser parameters were involved in this work. The old pupae of 1, 2, 3, 4 and 5 days were exposed to laser radiation during 10, 30 and 60 second with repetition rate 10, 20 and 30 pulse/second. The percent of normal adults emergence (female and male) was investigated. The results showed that the adults emergence was highly decreased as the repetition rate and exposure time increased when the pupae irradiated for 1, 2 and 3 days old as compared with 4 and 5 days. The results also indicated that the pupal period was significantly increased of irradiated pupae for 1, 2, 3 and 4 days old, whi
... Show MoreBackground: Dysfunction of sinoatrial node is a set of abnormal rhythms which are resulted from the sinoatrial node malfunction of the sinus node, the chief natural cardiac pacemaker. The common, and occasionally, the single method for treatment of heart arrhythmias was implantation of pacemaker, which reduce symptoms exactly occurs after implantation. Aim: To detect the role of smoking on cardiac electrophysiology parameters in sinus node dysfunction in Iraqi patients such as SNRT and AH. Methods: A cross sectional study, was conducted on 59 patient ranging between 20-50 years old and involving 35 female and 24 male patients, suffering from an unexplained symptoms of sinoatrial node dysfunction (SND). The enrolled participants were gathere
... Show MoreTopological indices provide important insights into the structural characteristics of molecular graphs. The present investigation proposes and explores a creative graph on a finite group G, which is known as the RIG. This graph is designated as ΓRS G2(4) indicating a simple undirected graph containing elements of G. Two distinct ertices are regarded as nearly the same if and only if their sum yields a non-trivial involution element in G. RIGs have been discovered in various finite groups. We examine several facets of the RIG by altering the graph through the conjugacy classes of G. Furthermore, we investigate the topological indices as applications in graph theory applying the distance matrix of the G2(4) group.
In this study, the effects of blending the un-branched acrylate polymer known as Poly (n-decyl acrylate), and the branched acrylate polymer known as Poly (iso-octyl acrylate), on the viscosity index (VI), and the pour point of the Iraqi base stocks 40, and 60 respectively, were investigated. Toluene was used as a carrier solvent for both polymer types. The improvement level of oils (VI, & pour point) gained by blending the oil with the acrylate derived polymers was compared with the values of (VI, and pour point) gained by blending the oil with a commercial viscosity index, and pour point improver. The commercial lubricant additive was purchased and used by Al-Daura Refineries. It consisted of an un-known olefin copolymer dissolved i
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show Moreraisin on mice in comparison with negative (phosphate buffer saline (PBS) and positive Mitomycin-C (MMC) controls. Moreover, the effect on fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) was also measured. The effect of the extracted samples were measured by employing cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs) and micronucleus (MN)) parameters. Results showed that significant increase in MI and significant reduction in both CAs and MN percentage were seen after treatment with both alcoholic and water extracts of the two raisins and alcoholic extracts was more effective than water extracts. On the other hand both the gold and black raisin enhanced the levels of the
... Show MoreThis study was conducted at the Poultry Research Station of the Agricultural Research Department/Ministry of Agriculture in Abu Ghraib for the period from 25/2/2019 to 7/4/2019 (42 days) with the aim of using several levels of Spirulina (SP)
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More