High temperature superconductors with a nominal composition HgBa2Ca2Cu3O8+δ
for different values of pressure (0.2,0.3, 0.5, 0.6, 0.9, 1.0 & 1.1)GPa were prepared by
a solid state reaction method. It has been found that the samples were semiconductor
P=0.2GPa.while the behavior of the other samples are superconductor in the rang
(80-300) K. Also the transition temperature Tc=143K is the maximum at P is equal to
0.5GPa. X-ray diffraction showed a tetragonal structure with the decreasing of the
lattice constant c with the increasing of the pressure. Also we found an increasing of
the density with the pressure.
Background: Nicotine is the foremost chemical constituent responsible for addiction in tobacco products, in the non-ionized condition can be easily absorbed via epithelial tissue of the lung, the mouth, the nose and across the skin
Objective:The study examines the harmful effect of the nicotine which is an important component of cigarette in vitro.
Type of the study: Cross-sectional study.
Methods: Examines the harmful effect of the nicotine which is an important component of cigarette in vitro by using two types of lung cancer cell lines (H460 TP53+/+, H441 TP53-/-).
The objective was to study the effect of prepared ginkgo biloba extracts against Candida albicans isolated from healthy persons. Conducting susceptibility test, biofilm formation test, phytochemical screening test, and antioxidant activity test. One hundred oral swabs sample were obtained from healthy persons with oral lesion attending dentistry teaching hospital in dentistry college, their age ranged from 1-30 years of both sexex. The studied samples collected through 8 months (April - December / 2018). This study included two different types of ginkgo bilola extracts were prepared as aqueous and ethanolic extracts. Many tests were used, which included isolation and identification of C.albicans, conduct susceptibility test, biofilm form
... Show MoreAsthma is a chronic respiratory disorder in which immunological and structural cells play a role. The limits of conventional medicines necessitate the development of innovative therapeutic techniques for asthma. In the present study, we investigated the possible protective effect of cinnamic acid (CA) on ovalbumin-induced asthma in a mouse model. Sixty albino male mice BALB/c type weighing (20-30) grams were chosen at random and divided into five groups each one contains 12 animal: Group I: PBS/liquid paraffin control. Group II: asthma model group. Group III: cinnamic acid control group; mice received cinnamic acid (50 mg/kg) in liquid paraffin orally by gavage. Group IV: asthma model / group of (25 mg / kg) cinnamic acid; mice received
... Show MoreIn this work, the effect of ceramic coating on performance, exhaust gas temperature and gases emissions of diesel engine operated on diesel fuel and biodiesel blends was investigated. A conventional four stroke, direct injected, single cylinder, diesel engine was tested at constant speed and at different load conditions using diesel fuel and biodiesel blends. The inlet and exhaust valves, the head of piston and cylinder head of the engine were coated by ceramic materials. Ceramic layers were made of (210-240) μm of Al2O3 and (30-60) μm of 4NiCr5Al as a bond coat for inlet and exhaust valves and (350-400) μm of YSZ and (50-100) μm of 4NiCr5Al as a bond coat for head of piston and (280-320) μm of Sic and (40-80) μm of 4NiCr5Al as a b
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show More