This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5NPs were determined using the (EDX) pattern, Atomic force microscopy AFM. The adsorption experiment was successfully conducted on metal ions M (II), such as Co, Ni, and Cu. The results proved removal simultaneously from water using V2O5NPs based on surface shape on the affinity of three metal ions. The adsorption rate of Ni(II) is the highest one in the time scale and conditions of our experiment at all surfaces, while Co(II) and Cu(II) ions are close in magnitude. The removal efficiencies of mixed (M+2 = Co, Ni, and Cu) ions with λmax for Co, Ni, and Cu ions are 510,425 and 814 nm 56.66%, 77.00%, and 27.23%, respectively. The Antimicrobial activity of V2O5NPs in three concentrations, 25%, 50%, and 75%, was tested against Escherichia coli, Staphylococcus aureus, and Candida albicans fungus. The results of the inhibition of vanadium oxide nanoparticles against positive and negative bacteria were compared with the standard drug Amoxicillin and the results of fungus inhibition with the standard drug Metronidazole. It was found that nano-oxide is more effective at 75% concentration.
In this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model duri
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Abstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show More