Manganese-zinc ferrite MnxZn1-xFe2O4 (MnZnF) powder was prepared using the sol-gel method. The morphological, structural, and magnetic properties of MnZnF powder were studied using X-ray diffraction (XRD), atomic force microscopy (AFM), energy dispersive X-ray (EDX), field emission-scanning electron microscopes (FE-SEM), and vibrating sample magnetometers (VSM). The XRD results showed that the MnxZn1-xFe2O4 that was formed had a trigonal crystalline structure. AFM results showed that the average diameter of Manganese-Zinc Ferrite is 55.35 nm, indicating that the sample has a nanostructure dimension. The EDX spectrum revealed the presence of transition metals (Mn, Fe, Zn, and O) in Manganese-Zinc Ferrite. The FE-SEM results of MnZnF showed uniform spherical structures. VSM was used to study the change in magnetization, the saturation magnetization, (Ms) value of the samples. The measurement of VSM indicated that the MnZnF exhibits ferromagnetic behavior with coercivity Hc (0.0014 Gauss), remanent magnetization (Mr) (0.202 emu/gr), and saturation magnetization Ms (2.69 emu/g).
The application of low order panel method with the Dirichlet boundary condition on complex aircraft configuration have been studied in high subsonic and transonic speeds. Low order panel method has been used to solve the case of the steady, inviscid and compressible flow on a forward swept wing – canard configuration with cylindrical fuselage and a vertical stabilizer with symmetrical cross section. The aerodynamic coefficients for the forward swept wing aircraft were calculated using measured wake shape from an experimental work on same model configuration. The study showed that the application of low order panel method can be used with acceptable results
Cupressus sempervirens L., Cupressaceae, that is known as evergreen cypress, Mediterranean cypress and in Arabic called “al -Sarw. It is an evergreen, medium sized, longevity, and wide distributed over all the world. The plant represents an important member of conifer plants which characterized with aromatic leaves and cones. Cupressus sempervirens have been ethnobotanical uses as an antiseptic, relief of cough, astringent, antispasmodic, wound healing and anti-inflammatory. Aims of this work are phytochemical analysis, isolation and structural identification of Quercitroside (quercitrin) and essential oil in Iraqi C. sempervirens. Isolation of quercitrin was
... Show MoreA new series of metal ions complexes of VO(II), Cr(III), Mn(II), Zn(II), Cd(II) and Ce(III) have been synthesized from the Schiff bases (4-chlorobenzylidene)-urea amine (L1) and (4-bromobenzylidene)-urea amine (L2). Structural features were obtained from their elemental microanalyses, magnetic susceptibility, molar conductance, FT-IR, UV–Vis, LC-Mass and 1HNMR spectral studies. The UV–Vis, magnetic susceptibility and molar conductance data of the complexes suggest a tetrahedral geometry around the central metal ion except, VOII complexes that has square pyramidal geometry, but CrIII and CeIII octahedral geometry. The biological activity for the ligand (L1) and its Vanadium and Cadmium complexes were studied. Structural geometries of com
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show More