In recent years, observed focus greatly on gold nanoparticles synthesis due to its unique properties and tremendous applicability. In most of these researches, the citrate reduction method has been adopted. The aim of this study was to prepare and optimize monodisperse ultrafine particles by addition of reducing agent to gold salt, as a result of seed mediated growth mechanism. In this research, gold nanoparticles suspension (G) was prepared by traditional standard Turkevich method and optimized by studying different variables such as reactants concentrations, preparation temperature and stirring rate on controlling size and uniformity of nanoparticles through preparing twenty formulas (G1-G20). Subsequently, the selected formula that prepared from the best tested condition was further optimized by preparing it using inverse method via the addition of gold salt to the reducing agent in opposite to the previous traditional method (G21). The optimized gold nanoparticles were characterized by SEM, EDX, TEM and zeta potential. The obtained results indicated that (G21) with reactants concentrations of 0.5mM and 10mM for HAuCl4.3H2O and trisodium citrate dihydrate respectively, 65°C of preparation temperature and 1500rpm of stirring rate was chosen as an optimized formula according to AFM provided gold nanoparticles with smoother surface, smaller size (average 8.75nm) with more uniform size distribution (7.32%) as well as short over all preparation time (27minutes). In addition to that all results of SEM, EDX and TEM indicated uniform spherical shape with zeta potential of -47.87. In conclusion, inversed method is promising for the preparation of gold nanoparticles with high monodispersity.
New isatinic hydrazone Schiff-base ligands, namely furan-2-carboxylic acid (2-oxo-1,2-dihydro-indol- 3-ylidene)-hydrazide (L1), thiophene-2-carboxylic acid (2- oxo-1,2-dihydro-indol-3-ylidene)-hydrazide (L2) and 2-(pyridine-2-yl-hydrazono)-1,2-dihydro-indol-3-one) (L3) are reported. The ligands were prepared by the condensation of furan-2-carboxylic acid hydrazide (L1), thiophene- 2-carboxylic acid hydrazide (L2), and 2-hydrazino pyridine (L3) with isatine. Monomeric complexes were prepared from the reaction of the corresponding metal chloride with the ligands. The ligands and their nine new complexes of the general formulae [M(Ln)2]Cl2 [where M = Co(II), Zn(II) and Cd(II); n = L1, L2 and L3] were characterised by spectroscopic methods (FTI
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More