The Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capital R-squared explained variation as a percentage/total variation (R2%) equal to 99.73. The method has been successfully applied for the estimation of Cu(II) ions without the infl uence of other interfering ions, and it can be applied to estimate Cu(II) in any sample.
In the present work, a D.C. magnetron sputtering system was
designed and fabricated. This chamber of this system includes two
coaxial cylinders made from copper .the inner one used as a cathode
while the outer one used as a node. The magnetic coils located on
the outer cylinder (anode) .The profile of magnetic field for various
coil current (from 2Amp to 14Amp) are shown. The effect of
different magnetic field on the Cu thin films thickness at constant
pressure of 7x10-5mbar is investigated. The result shown that, the
electrical behavior of the discharge strongly depends on the values
of the magnetic field and shows an optimum value at which the
power absorbed by the plasma is maximum. Furthermore, the
pl
The main objective of this paper is to determine an acceptable value of eccentricity for the satellites in a Low Earth Orbit LEO that are affected by drag perturbation only. The method of converting the orbital elements into state vectors was presented. Perturbed equation of motion was numerically integrated using 4th order Runge-Kutta’s method and the perturbation in orbital elements for different altitudes and eccentricities were tested and analysed during 84.23 days. The results indicated to the value of semi major axis and eccentricity at altitude 200 km and eccentricity 0.001are more stable. As well, at altitude 600 km and eccentricity 0.01, but at 800 km a
In this study, the results of x-ray diffraction methods were used to determine the Crystallite size and Lattice strain of Cu2O nanoparticles then to compare the results obtained by using variance analysis method, Scherrer method and Williamson-Hall method. The results of these methods of the same powder which is cuprous oxide, using equations during the determination the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (28.302nm) and the lattice strain (0.03541) of the variance analysis method respectively and for the Williamson-Hall method were the results of the crystallite size (21.678nm) and lattice strain (0.00317) respectively, and Scherrer method which gives the value of c
... Show MoreIron oxide(Fe3O4) nanoparticles of different sizes and shapes were synthesized by solve-hydrothermal reaction assisted by microwave irradiation using ferrous ammonium sulfate as a metal precursor, oleic acid as dispersing agent, ethanol as reducing agent and NaOH as precipitating agent at pH=12. The synthesized Fe3O4 nano particles were characterized by X-ray diffraction (XRD), FTIR and thermal analysis TG-DTG. Sizes and shapes of Fe3O4 nanoparticles were characterized by Scanning Electron Microscopy (SEM), and atomic force microscopy (AFM).
This study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting fun
... Show More
This work focuses on the implementation of interfaces for human machine interaction (HMI) for control and monitor of automatic production line. The automatic production line which can performance feeding, transportation, sorting functions.
The objectives of this work are implemented two SCADA/HMI system using two different software. TIA portal software was used to build HMI, alarm, and trends in touch panel which are helped the operator to control and monitor the production line. LabVIEW software was used to build HMI and trends on the computer screen and was linked with Micros
... Show MoreThe -mixing of - transition in Er 168 populated in Er)n,n(Er 168168 reaction is calculated in the present work by using a2- ratio method. This method has used in previou studies [4, 5, 6, 7] in case that the second transition is pure or for that transition which can be considered as pure only, but in one work we applied this method for two cases, in the first one for pure transition and in the 2nd one for non pure transitions. We take into accunt the experimental a2- coefficient for p revious works and -values for one transition only [1]. The results obtained are, in general, in agood agreement within associated errors, with those reported previously [1], the discrepancies that occur are due to inaccuracies existing
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreExperienced organizations in recent years, significant challenges , especially with the spread of economic globalization, making it required to provide new and better through experience , creativity and innovation to achieve the quality and high-quality products of all kinds , in order to achieve the objectives of the study and to answer its questions tested the study in the woolen Industries sector in Baghdad . The study was applied to a sample of 30 people in the senior management and the middle and lower in the company (managers of sections , and managers of people , and managers of the units , and office managers ) and for the processing of data and information used several statistical methods and extracted result
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the