
Ethanol as a solvent, a precursor of titanium isopropoxide and a stabilizer of either hydrochloric acid or ammonium hydroxide was used to prepare a titanium dioxide aqueous solution. The aqueous solutions with different values of pH and the morphology of the resultant reaction of the nanoparticles of titanium dioxide were investigated. The X-ray diffraction showed that at low temperatures and with acidic solutions, rutile structures are more favorable to grow on titanium dioxide synthesized, while at low and average temperatures and with base solutions, anatase phase is more pronounced. The crystalline form and the re-confirmation of the crystallite size growth were observed by the scanning electron microscopy. The atomic force micr
... Show MoreEthanol as a solvent, a precursor of titanium isopropoxide and a stabilizer of either hydrochloric acid or ammonium hydroxide was used to prepare a titanium dioxide aqueous solution. The aqueous solutions with different values of pH and the morphology of the resultant reaction of the nanoparticles of titanium dioxide were investigated. The X-ray diffraction showed that at low temperatures and with acidic solutions, rutile structures are more favorable to grow on titanium dioxide synthesized, while at low and average temperatures and with base solutions, anatase phase is more pronounced. The crystalline form and the re-confirmation of the crystallite size growth were observed by the scanning electron microscopy. The atomi
... Show MoreIt is through a review of conversion of vegetable oils into glycidyl ethers focusing on their roles in achieving sustainability and improved epoxy resin performance. It involves functionalization of triglycerides in the form of epoxidation followed by glycidylation and yields bio-based monomers having improved mechanical as well as thermal properties. The review covers the underlying chemistry, production drivers, industrial applications, and future issues, supported by quantitative data and comparative studies. In addition, it integrates recent data on catalyst choice, feedstock flexibility, and environmental performance factors of bio-based resins, indicating their suitability for replacing traditional petroleum-based components.<
... Show MoreHot-wire cutting is one of the important, non-traditional thermomechanical way to cut polymer, usually expanded foam and extruded foam, in low volume manufacturing. The study and analysis of Hot-Wire cutting parameters play an important role to enhance the quality and accuracy of the process and products. The effects on the surface have been investigated by using experimental tests designed according to the Taguchi orthogonal array (OA). In this study, four parameters with five levels for each parameter have been used: [temperature of wire (A) (100, 120, 130, 150, 160) °C], [diameter of wire (B) (0.3,0.4,0.5,0.7,0.8) mm], [velocity of cutting (C) (200, 300,400,500,600) mm/min], [and density of foam (D) (0.01,0.0
... Show MoreRegistration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by de
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreHigh peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with
... Show MoreRegistration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration p
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More