In this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) images show that the CSNPs- Linker- alkaloids compound have two shapes in the nano dimension: spherical particles and nanotubes, which may be due to nuclei and growth processes, respectively. The energy gap calculated from the photoluminescence spectrum is equal to 2.5 eV. The Hall effect measurements prove that the synthesized CSNPs- Linker-alkaloids compound is a p-type semiconductor. The cycle voltammetry technique was used to detect the Zn ions in different concentrations in the water by modifying the electrochemical system's glassy carbon electrode (GCE) with a CSNPs-Linker-alkaloids compound. The modified electrode was used to detect Zn ions in the range of (1-8) ppm, which causes water pollution. The best sensor sensitivity R² equals 0.997 for oxidation and 0.993 for reduction. This modified electrode (GCE /CSNPs- Linker-alkaloids) acts as a good biosensor for heavy metals detection in water as well as for biophysics applications.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreSingle long spiral tube column pressure swing adsorption (PSA) unit, 25 mm diameter, and 6 m length was constructed to study the separation of water from ethanol at azeotropic concentration of 95 wt%. The first three meters of the column length acted as a vaporizer and the remaining length acted as an adsorber filled by commercial 3A zeolite. The effect of pressure, temperature and feed flow rate on the product ethanol purity, process recovery and productivity were studied. The results showed that ethanol purity increased with temperature and pressure and decreased with feed flow rate. The purity decreased with increasing productivity. The purity range was 98.9 % to 99.6 %, the recovery range was 0.82 to 0.92 and the productivity range w
... Show MoreHydrogen fuel is a good alternative to fossil fuels. It can be produced using a clean energy without contaminated emissions. This work is concerned with experimental study on hydrogen production via solar energy. Photovoltaic module is used to convert solar radiation to electrical energy. The electrical energy is used for electrolysis of water into hydrogen and oxygen by using alkaline water electrolyzer with stainless steel electrodes. A MATLAB computer program is developed to solve a four-parameter-model and predict the characteristics of PV module under Baghdad climate conditions. The hydrogen production system is tested at different NaOH mass concentration of (50,100, 200, 300) gram. The maximum hydrogen produc
... Show MoreCrop production is reduced by insufficient and/or excess soil water, which can significantly decrease plant growth and development. Therefore, conservation management practices such as cover crops (CCs) are used to optimize soil water dynamics, since CCs can conserve soil water. The objective of this study was to determine the effects of CCs on soil water dynamics on a corn (
The problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t