Manganese-zinc ferrite MnxZn1-xFe2O4 (MnZnF) powder was prepared using the sol-gel method. The morphological, structural, and magnetic properties of MnZnF powder were studied using X-ray diffraction (XRD), atomic force microscopy (AFM), energy dispersive X-ray (EDX), field emission-scanning electron microscopes (FE-SEM), and vibrating sample magnetometers (VSM). The XRD results showed that the MnxZn1-xFe2O4 that was formed had a trigonal crystalline structure. AFM results showed that the average diameter of Manganese-Zinc Ferrite is 55.35 nm, indicating that the sample has a nanostructure dimension. The EDX spectrum revealed the presence of transition metals (Mn, Fe, Zn, and O) in Manganese-Zinc Ferrite. The FE-SEM results of MnZnF showed uniform spherical structures. VSM was used to study the change in magnetization, the saturation magnetization, (Ms) value of the samples. The measurement of VSM indicated that the MnZnF exhibits ferromagnetic behavior with coercivity Hc (0.0014 Gauss), remanent magnetization (Mr) (0.202 emu/gr), and saturation magnetization Ms (2.69 emu/g).
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreEstimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreA numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro
In the current study, the observations depended on some nuclear properties of Germanium isotopes that are used for multiple purposes by studying transverse sections when interacting with charged particles such as alpha and proton particles and their interaction with gamma rays of conjugal isotopes relative to the stability of the nucleus with other nuclei. By calculating the cross sections of the (α, ) , (γ,x)0-NN-1, (γ,2n) , (α,p) reactions of isotope. Nuclear reactions in the newer global libraries (EXFOR, ENDF, JEF, JEFF, GENDL) have been published to identify appropriate energies in calculating the inverse nuclear re
... Show MoreBackground: One of the most prevalent procedures in oral surgery is the removal of impacted mandibular third molars, typically accompanied by trismus, edema, and pain. Several methods and biomaterials were implemented to mitigate or avoid these surgical problems. Objectives: To evaluate the efficiency of chlorhexidine gel (WISDOM®) in minimizing postoperative sequelae associated with the impacted mandibular third molar that will be surgically extracted and its role in promoting early soft tissue closure of the surgical site. Methods: The study design was a double-masked and randomized, controlled clinical study that included healthy patients needing the removal of a mandibular third molar through surgery. The participants were rand
... Show Morethis work, a simple method was used to prepare the MnO2 nanoparticles. These nanoparticles then were characterized by several techniques, such as X-ray diffraction, Fourier transform infrared spectroscopy, scanning electron microscopy (SEM) and atomic force microscope (AFM). The results showed that the diffraction peak of MnO2 nanoparticles was similar to that of standard data. The images of AFM and SEM indicated that the MnO2 nanorods were growing from the MnO2 nano spherical shape. PVA-pentaerythritol/MnO2 nanocomposite films were fabricated by evaporating casting method. The dielectric constant and loss tangent of P-Ery/MnO2 films were measured between 10 kHz and 1 MHz using LCR. As the content of MnO2 increased, the dielectric constant
... Show MoreA new two series of liquid crystalline Schiff bases containing thiazole moiety with different length of alkoxy spacer were synthesized, and the relation between the spacer length and the liquid crystalline behavior was investigated. The molecular structures of these compounds were performed by elemental analysis and FTIR, 1HNMR spectroscopy. The liquid crystalline properties were examined by hot stage optical polarizing microscopy (OPM) and differential scanning calorimetry (DSC). All compouns of the two series display liquid crystalline nematic mesophase. The liquid crystalline behaviour has been analyzed in terms of structural property relationship