tA novel synthesis procedure is presented for preparing triethanolamine-treated graphene nanoplatelets(TEA-GNPs) with different specific areas (SSAs). Using ultrasonication, the covalently functionalizedTEA-GNPs with different weight concentrations and SSAs were dispersed in distilled water to prepareTEA-GNPs nanofluids. A simple direct coupling of GNPs with TEA molecules is implemented to synthesizestable water-based nanofluids. The effectiveness of the functionalization procedure was validated by thecharacterization and morphology tests, i.e., FTIR, Raman spectroscopy, EDS, and TEM. Thermal conduc-tivity, dispersion stability, and rheological properties were investigated. Using UV–vis spectrometer, ahighest dispersion stability of 0.876-relative concentration was reached after 100 days from preparation.Water-based TEA-GNPs nanofluids showed quite Newtonian behavior with an increase in the measuredvalues of viscosity as weight concentration increases and temperature decreases. As the classical modelsof viscosity underestimated the experimental viscosity data for the TEA-GNPs nanofluids, a correla-tion was proposed and showed good agreement. Thermal conductivity values increased as the weight concentration, SSA, and temperature increased. Nanofluid containing TEA-GNPs with SSA of 750 m2/gand 0.1-wt% showed the highest increase in thermal conductivity, i.e., from 0.673 to 0.752 W/m K as thetemperature increased from 20 to 40◦C. The novel type of nanofluids that were prepared in this studyrevealed notable potential for use as advanced working fluids in various heat transfer applications.
Mandali Basin is located between latitudes (33◦ 39' 00" and 33◦
54' 55") to the north and longitudes (45ο 11' 00" and 45ο 40' 00") to the
east; to the east of Diyala province at the Iraqi-Iranian border; the
basin area is approximately 491 km2.
From the study of climate reality of the basin between 1990-
2013and assessment of the basic climate transactions, it was found
that the annual rate of rainfall is 253.02 mm, the relative humidity
(44.4%), the temperature (21.3 ◦C), wind speed (2.08 m /sec.),
sunshine (8.27 h/day) and evaporation of the basin class (a) (271.98
mm) and corrected potential evapotranspiration (80.03 mm). The
results of the data analysis show that, there are
Poly-ether-ether-ketone (PEEK) was introduced in dentistry as an alternative to metal alloys.
To assess the effectiveness of PEEK-fixed retainers in preserving the stability of mandibular anterior and participant satisfaction as compared to the Dead-soft coaxial fixed retainer (DSC).
A single-centre, two-arm parallel groups
The indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More