In this study, aluminum nanoparticles (Al NPs) were prepared using explosive strips method in double-distilled deionized water (DDDW), where the effect of five different currents (25, 50, 75, 100 and 125 A) on particle size and distribution was studied. Also, the explosive strips method was used to decorate zinc oxide particles with Al particles, where Al particles were prepared in suspended from zinc oxide with DDDW. Transmission electron microscopy (TEM), UV-visible absorption spectroscopy, and x-ray diffraction are used to characterize the nanoparticles. XRD pattern were examined for three samples of aluminum particles and DDDW prepared with three current values (25, 75 and 125 A) and three samples prepared with the same currents for zinc oxide suspension with aluminum particles and DDDW. It was observed that when increasing the percentage of prepared Al particles in the suspension consisting of zinc oxide and DDDW, the energy gap of zinc oxide gradually decreased in the samples. Transmission electron microscopy (TEM) analysis is conducted to examine the size, shape, and aggregation of the nanoparticles. The TEM images reveal that the Al nanoparticles exhibit a quasi-spherical shape. The particle size distribution analysis shows that the average crystal size of Al decreases with an increase in the detonation current. This method yields particle with average sizes within the range of 20 to 90 nm. When decorating zinc oxide particles by generating Al nanoparticles inside a suspension of zinc oxide and DDDW, the size of the resulting particles increases with increasing current. © ALL RIGHTS RESERVED.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
HR Al-Hamamy, KE Sharquie, AA Noaimi, WN Hussein, Our Dermatology Online, 2014 - Cited by 6
Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreObjective This study evaluated the effects of adding titanium oxide (TiO2) nanofillers on the tear strength, tensile strength, elongation percentage, and hardness of room-temperature-vulcanized (RTV) VST50F and high-temperature-vulcanized (HTV) Cosmesil M511 maxillofacial silicone elastomers. Methods Two types of maxillofacial elastomers, VST50F RTV and Cosmesil M511 HTV, were used. Nano-TiO2 powder was applied as a nanofiller. A total of 120 specimens were fabricated, 60 each of VST50F and Cosmesil M511. The specimens of each type of elastomer were divided into three equal groups on which tests were conducted for tear strength, tensile strength, and hardness i.e., 20 specimens were used for each test. Each group of 20 specimens was further
... Show MoreAbstract
The Non - Homogeneous Poisson process is considered as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).
This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto , to estimate th
... Show MoreResearch summarized in applying the model of fuzzy goal programming for aggregate production planning , in General Company for hydraulic industries / plastic factory to get an optimal production plan trying to cope with the impact that fluctuations in demand and employs all available resources using two strategies where they are available inventories strategy and the strategy of change in the level of the workforce, these strategies costs are usually imprecise/fuzzy. The plant administration trying to minimize total production costs, minimize carrying costs and minimize changes in labour levels. depending on the gained data from th
... Show More