This study uses an environmentally friendly and low-cost synthesis method to manufacture zinc oxide nanoparticles (ZnO NPs) by using zinc sulfate. Eucalyptus leaf extract is an effective chelating and capping agent for synthesizing ZnO NPs. The structure, morphology, thermal behavior, chemical composition, and optical properties of ZnO nanoparticles were studied utilizing FT-IR, FE-SEM, EDAX, AFM, and Zeta potential analysis. The FE-SEM pictures confirmed that the ZnO NPs with a size range of (22-37) nm were crystalline and spherical. Two methods were used to prepare ZnO NPs. The first method involved calcining the resulting ZnO NPs, while the second method did not. The prepared ZnO NPs were used as adsorbents for removing acid black 210 dye (AB210) from simulated wastewater. The removal efficiency using calcinated and uncalcinated ZnO NPs was 57 % and 59 %, respectively.
The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreThe Indian costus plasma properties are investigated including electron temperature (Te), "electron density (ne)", "plasma frequency (fp)", " Debye sphere length", and amount of Debye(Nd), using the spectrum of optical emission technique. There are several energies used, with ranging from 300 to 600 mJ. The Boltzmann Plot is used to calculate the temperature; where as Stark's Line Broadening is used to calculate the electron density. The Indian costus was spectroscopically examined in the air with the laser at 10 cm away from the target and the optical fiber at 0.5 cm away. The results were obtained for an electron temperature range of (1.8-2.2) electron volts (ev) and a wavelength range of (300-600) nm. The XRF analysis reveals th
... Show MoreTypographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreFingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show More