The degradation of Toluidine Blue dye in aqueous solution under UV irradiation is investigated by using photo-Fenton oxidation (UV/H2O2/Fe+). The effect of initial dye concentration, initial ferrous ion concentration, pH, initial hydrogen peroxide dosage, and irradiation time are studied. It is found put that the removal rate increases as the initial concentration of H2O2 and ferrous ion increase to optimum value ,where in we get more than 99% removal efficiency of dye at pH = 4 when the [H2O2] = 500mg / L, [Fe + 2 = 150mg / L]. Complete degradation was achieved in the relatively short time of 75 minutes. Faster decolonization is achieved at low pH, with the optimal value at pH 4 .The concentrations of degradation dye are detected by spectrophotometer at ?max =626 nm. The order of photo degradation reaction under UV is the first order kinetics. The photo-Fenton degradation process was monitored by UV-visible spectrophotometer.
The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreElectrochemical Grinding (ECG) process is a mechanically assisted electrochemical process for material processing. The process is able to successfully machine electrically conducting harder materials at faster rate with improved surface finish and dimensional control. This research studies the effect of applied current, electrolyte concentration, spindle speed and the gap between workpiece and tool on hardness and material removal rate during electrochemical grinding for stainless steel 316. The characteristic features of the electrochemical grinding process are explored through Taguchi-design-based experimental studies. The better hardness can be obtained at 10 A of the current, 150 g/l of the electrolyte concentration, 0.3 mm of gap an
... Show MoreIn this paper, we studied the travelling wave solving for some models of Burger's equations. We used sine-cosine method to solution nonlinear equation and we used direct solution after getting travelling wave equation.
The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreImages hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA i
... Show MoreA theoretical calculations of the rate constant of electron transfer (ET) in a dye – semiconductor system with variety solvent are applied on system contains safranineT dye with TiO2 in many solvents like water, 1-propanol, Formamide, Acetonitrile and Ethanol.
A matlap program has been written to evaluate many parameters such that, the solvent reorganization energy, effective free energy, activation free energy, coupling matrix element and the rate constant of electron transfer.
The results of the rate constant of electron transfer calculated theoretically are in a good agreement with experimental and theoretical value
... Show MoreEquation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy