This study synthesized zeolite 4A, and hierarchical composite structure consisting of zeolite 4A- carbon were successfully prepared. Hydrothermal method was used to grow a layer of zeolite 4A over porous carbon surfaces to enhance mass transfer and increase surface area of zeolite. The products then were used to remove radioactive cesium137Cs from liquid wastewater. Iraqi dates leaves midribs (DM) were used as locally available agricultural waste to prepare low- cost porous carbon, using carbonization method in tubular furnace at 900C for two hours. Hierarchical porous structures including zeolite are prepared by mechanically activating the carbon surface via Ultrasonicating nanoparticles suspension of ground zeolite type 4A.For preparing nanoparticles suspension, commercial zeolite has been milled using 0.3-0.4 mm diameter glass balls as grinding media. Nanoparticles of zeolite 4A acting as seeding (nucleation centers) increase the crystallization of amorphous aluminosilica gel on modification carbon surface. The products of the syntheses zeolite 4A and the hierarchal composite materials (DMZ) were characterized using Scanning Electron Microscopy (SEM), X-ray diffraction (XRD), Nitrogen sorption (BET) and Energy dispersive X-ray spectrometer (EDX) to check the morphology, structure, surface area, and the chemical composition respectively. The products were used to treat radioactive wastewater contaminated with radioactive cesium 137Cs collected from destroyed building of the Radiochemistry Laboratories (RCL) in AL-Tuwaitha Nuclear Site. The activity concentration for the contamination water pre and after the treatment were measured using gamma spectroscopy system supplied with a high purity germanium detector (HPGe) with 60% relative efficiency. The results showed that the radioactivity concentration after the treatment process decreased significantly from 4800 Bq/L to 186 and Bq/L,121 Bq/L using 0.045 gm from synthesized zeolite 4A and DMZ respectively.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.
This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.