This study shows that it is possible to fabricate and characterize green bimetallic nanoparticles using eco-friendly reduction and a capping agent, which is then used for removing the orange G dye (OG) from an aqueous solution. Characterization techniques such as scanning electron microscopy (SEM), Energy Dispersive Spectroscopy (EDAX), X-Ray diffraction (XRD), and Brunauer-Emmett-Teller (BET) were applied on the resultant bimetallic nanoparticles to ensure the size, and surface area of particles nanoparticles. The results found that the removal efficiency of OG depends on the G‑Fe/Cu‑NPs concentration (0.5-2.0 g.L-1), initial pH (2‑9), OG concentration (10-50 mg.L-1), and temperature (30-50 °C). The batch experiments showed that 54% of 10 mg.L-1 of OG was removed within the optimum dose, pH, and temperature which were 1 g.L-1, 7 and 30°C respectively. The results of kinetic adsorption models and mechanisms indicate that OG uptake on G‑Fe/Cu‑NPs follows the pseudo-second-order kinetic model, physisorption, and exothermic process with (‑22.9 kJ.mol-1) activation energy. Adsorption isotherm investigated with models of Freundlich, Langmuir, Temkin, and Dubinin, in addition, the parameters of thermodynamic such as DG°, DH°, and DS° were ‑0.462 kJ.mol-1, ‑35.88 kJ.mol-1, and 0.116 kJ.mol.K-1 respectively, this indicted spontaneous, exothermic and favorable adsorption.
In this study four species from Solanaceae family was conducted. These four species belong to four different genera (Solanum L. ? Physalis L. ?Withania Pauq. ? Lycium L.) The study included morphological characters of sex organs and their pollen grains for these Iraqi wild plants.The results showed that the position of epipetalous stamens , the shape of anther, their dimensions ,and the length of filaments are important taxonomical characters .On the others hand the shape of their ovaries and stigmas are also important characters in distinguish between these four species .Pollen grains are similar in their general shapes and polarities, they have three germinal furrows and germinal apertures, so they are minor in distinguish between these f
... Show MoreThe bacterial contamination of lipsticks and face cream may become a great important matter in the medical laboratories. The present study was designed to determine the types of bacterial contamination in the face cream and lipsticks of undergraduate students. Also, the study aimed to determine the sensitivity of the isolated bacteria against many antibacterial agents. The study included 190 swabs samples from 190 face cream and lipsticks samples of the females’ students from five departments in the Medical Technology Institute, Almansour, Middle Technical University were collected in February 2018. The swab samples were collected with sterile condition and cultured on enriched Blood agar and MacConkey agar. Serial dilutions were made up
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreMedian filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreHemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to
... Show MoreThis paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.
This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More