تم في هذا البحث استخدام المحفز الجديد المصنع من تحميل دقائق البلاتين النانوية على سطح الصفائح النانوية للكرافين كمحفز ضوئي واختباره لدراسة التجزئة الضوئية لملوثات المياه وازالتها بشكل نهائي من مصادر المياه لما لها من تأثير سلبي على البيئة. حيث تم استخدام صبغة البروموفينول الأزرق كمثال على أحد الملوثات. في البدء تم التأكد من تحضير المحفز بالطريقة المستخدمة في طريقة العمل من خلال تشخيصه باستخدام عدد من التقنيات ومنها تقنية المجهر الالكتروني النافذ عالي الدقة، تقنية طاقة تشتت الاشعة السينية الطيفي عن طريق قياس الامتزاز/ الامتزاز باستخدام غاز النتروجين. كذلك تم قياس المساحة السطحية للمحفز المصنع، بالإضافة الى فحص التركيب الكريستال للمحفز باستخدام تقنية حيود الاشعة السينية. وبعد ان تم التأكد من التركيب النهائي للمحفز الضوئي تضمن الجزء الثاني من العمل دراسة قدرة المحفز المصنع على استخدامه في التجزئة الضوئية لصبغة البروموفينول الأزرق تحت الاشعة فوق البنفسجية حيث تم تحضير عدة تراكيز من صبغة البروموفينول الأزرق، تم تشعيع الصبغة بدون وجود المحفز ووجد بان التجزئة الضوئية لم تكن فعالة وبعد ذلك تم استخدام المحفز مع المحلول المائي للصبغة وبتركيز 15 جزء من المليون وأجريت التجارب باستخدام عدة اوزان من المحفز لتحديد افضل وزن يمكن استخدامه من المحفز في كمية محددة من محلول الصبغة ووجد ان 0.01 غرام من الصبغة لكل 250 ملليتر من المحلول المائي للصبغة هو افضل نسبة يمكن الحصول عليها. كما تم اختبار الوسط للتفاعل في الوسطين الحامضي والقاعدي ووجد ان تفكك الصبغة يزداد بشكل ملحوظ في الوسط القاعدي. تم اقتراح ميكانيكية التفاعل التي بينت ان تكون الجذور الحرة لها دور كبير في مهاجمة الاواصر المزدوجة في الصبغة.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThis study was done to compare the morphometric parameters of placentas in well controlled patients with preeclampsia, diabetes, and preeclampsia-diabetes with that of normal uncomplicated placentas. Patients & Methods: A total of Twenty four placentas were freshly collected. Six placentas for control group and eighteen placentas for complicated group (preeclamptic-diabetic and preeclamptic--diabetic subgroups). The placentas were grossly examined (shape, number of cotyledons, weight, and thickness). After suitable fixation, tissue processing and sectioning, the sections were stained by hematoxylin and eosin to study the general morphology and morphometry of the following parameters: number of terminal villi, number of syncytial knots, numb
... Show More