A simple low-cost approach at various exposure times was utilized to generate cold plasma in the aim to fabricate AuNPs. UV-Visible spectra and X-ray diffraction were used to characterize the nanoparticles (XRD). Surface Plasmon resonance was observed in the synthesized AuNPs at 530, 540, and 533 nm. For all samples, the patterns of XRD show very intensive peaks implying the fcc crystalline structure of AuNPs. The average crystallite size of AuNPs is ranging between 20-30 nm. The observation of morphology by FESEM revealed the spherical formation of AuNPs. Doses of 100 and 200 ppm of AuNPs were adapted to investigate their effect on the blood-mixture with and without a 20-second of cold plasma exposure. The WBC components in the blood rose as the AuNPs doses increased, whereas, the amount of (pt) in the blood fell down throughout the two weeks of AuNPs doses for the groups which exposed to AuNPs only, the level of (pt) in the blood increased in the groups which are exposed to AuNPs combined with cold plasma. While the RBC unaffected.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreDuring the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Assessment of the in service behavior of asphalt stabilized subgrade soil under environmental impact has got little attention by the research workers. However, the sustainability of the roadway depends mainly on the welfare of its subgrade soil condition. In this work, Gypseous soil was stabilized with asphalt emulsion for subgrade usage, the durability of the mixture has been assessed in term of its ability to maintain the compressive strength when practicing the environmental impacts. Specimens of 38 mm in diameter , and 76 mm in height have been prepared with various water-asphalt percentages, and subjected to 30 cycles of (freezing-thawing), (heating-cooling) and (wetting-drying) processes. Specimens have been tested for unconfined comp
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThe subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp
... Show More