In this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)
Background: Poly (methyl methacrylate) has several disadvantages (poor mechanical properties) like impact and transverse strength. In order to overcome these disadvantages, several methods were used to strengthen the acrylic resin by using different fibers or fillers. This study was conducted to evaluate the effect of Plasma treatment of the fiber on mechanical properties Poly (methyl methacrylate) denture base material. Materials and methods: Specimens were prepared from poly methyl metha acrylic (PMMA) divided according to present of fiber into 4 groups (first group without fiber as control group, second group with Plasma treated polyester fibers, third group with Plasma treated polyamide fibers and fourth group Plasma treated combination
... Show MoreWheat straw was modified with malonic acid in order to get low cost adsorbent have a good ability to remove copper and ferric ions from aqueous solutions, chemical modification temperature was 120°C and the time was 12 h. Parameters that affect the adsorption experiments were studied and found the optimum pH were 6 and 5 for copper and iron respectively and the time interval was 120 min and the adsorbent mass was 0.1 g. The values for adsorption isotherms parameters were determined according to Langmuir [qmax were 54.64 and 61.7 mg/g while b values were 0.234 and 0.22 mg/l] , Freundlich [Kf were 16.07 and 18.89 mg/g and n were 2.77 and 3.16], Temkin [B were 0.063 and 0.074 j/mol and At were 0.143 and 1.658 l/g] and for Dubinin-Radushkev
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreFor structural concrete members that may expose to serious earthquake, overload or accident impact, the design of ductility must be given the same importance as the flexural strength. The aim of this investigation is to study the change in ductility of structural concrete flexural members during their exposure to limited cycles of repeated loading. Twenty full-scale beam specimens have been fabricated in to two identical groups; each group consisted of ten specimens. The first group was tested under monotonic static loading to failure and regarded as control beams, while the specimens of the second group were subjected to ten cycles of repeated loading with constant load interval, which ranged between 40% and 60% of ultimate load. S
... Show MoreFor structural concrete members that may expose to serious earthquake, overload or accident impact, the design of ductility must be given the same importance as the flexural strength. The aim of this investigation is to study the change in ductility of structural concrete flexural members during their exposure to limited cycles of repeated loading. Twenty full-scale beam specimens have been fabricated in to two identical groups; each group consisted of ten specimens. The first group was tested under monotonic static loading to failure and regarded as control beams, while the specimens of the second group were subjected to ten cycles of repeated loading with constant load interval, which ranged between 40% and 60% of ultimate load. S
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More