Bimetallic Au –Pt catalysts supporting TiO2 were synthesised using two methods; sol immobilization and impregnation methods. The prepared catalyst underwent a thermal treatment process at 400◦ C, while the reduction reaction under the same condition was done and the obtained catalysts were identified with transmission electron microscopy (TEM) and energy-dispersive spectroscopy (EDS). It has been found that the prepared catalysts have a dimension around 2.5 nm and the particles have uniform orders leading to high dispersion of platinum molecules .The prepared catalysts have been examined as efficient photocatalysts to degrade the Crystal violet dye under UV-light. The optimum values of Bimetallic Au –Pt catalysts supporting TiO2 have been found (0.05g of the catalyst prepared in sol immobilization method, 0.07 g of the synthesised in impregnation procedure. The impact of pH on the degradation reaction was tested; it has been found that pH 10 is the best media for the reaction. The effect of temperature has been discussed when various temperatures were used, and the heat of photoreaction Ea was estimated from the Arrhenius relationship, it has been concluded that the reaction is independent of temperature as the activation energy was very small (Ea= 22 kJ/ mole). The thermodynamic functions; entropy, enthalpy and the free energy have been figured out. It has been found that the positive values of enthalpy ∆H# refer to endothermic reaction, moreover, it has been demonstrated that the photoreaction is an endergonic one according to the calculated values of the free energy of activation. It has been noticed that when temperature increases, it promotes the production of free radicals, but it has been noticed that exceeding the temperature more than the used range causes reducing the percentage of degradation of crystal violet, the reason is due to the limitation conditions of adsorption process at higher temperature on the surface of the catalyst.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreThe preparation and spectral characterization of complexes for Co(II), Ni(II), Cu(II), Cd(II), Zn(II) and Hg(II) ions with new organic heterocyclic azo imidazole dye as ligand 2-[(2`-cyano phenyl) azo ]-4,5-diphenyl imidazole ) (2-CyBAI) were prepared by reacting a dizonium salt solution of 2-cyano aniline with 4,5-diphenyl imidazole in alkaline ethanolic solution .These complexes were characterized spectroscopically by infrared and electronic spectra along with elemental analysis‚ molar conductance and magnetic susceptibility measurements. The data show that the ligand behaves a bidantate and coordinates to the metal ion via nitrogen atom of azo and with imidazole N3 atom. Octahedral environment is suggested for all metal complex
... Show MoreIn this work, a functional nanocomposite consisting of multi walled carbon nanotubes combined with nanoparticles of silver and Pomegranate peel extract (MWCNTs- SNPs -NPGPE) was successfully synthesized using ultra sonic technique. The nanocomposite has been characterized using Transmission electron microscope (TEM), XRD, Energy dispersive X-ray spectroscopy (EDS) UV-Vis and FTIR. The obtained results reveal that the MWCNTs-SNPs-NPGPE nanocomposite exhibits form of nanotubes with rough surfaces and containing black spots, which are the silver nanoparticles. The dimensions of this tube are 161 nm in length and 60 nm in width with nanoparticles of silver not exceeding 20 nm. The XRD pattern of the prepared MWCNTs-SNPs-NPGPE nanocomposite s
... Show MoreАрхив всех научных статей сборников конференций и журналов по направлению Филология.
Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
الملخص ان حق الملكية هو الحق الاوسع نطاقا يمنح صاحبه صلاحية ممارسة السلطات كافة ويكون محل هذه السلطات كل ما يملك الشخص سواء كان شقه او طبقة اسوة بالعقارات الاخرى كدار للسكن او ارض ، ومن اهم هذه السلطات واوسعها نطاقا ( هو سلطة التصرف ). تعد هذه السلطة جوهر حق الملكية وأخطر السلطات الممنوحة للمالك كونه بواسطتها يمكنه الاستغناء عن ملكه بأي تصرف ناقل له كالبيع أو الهبة او الوصية مثلا ، ولأهمية هذه السلط
... Show More