This work aim to prepare Ag/R6G/PMMA nanocomposite thin
films by In-situ plasma polymerization and study the changes in the
optical properties of fluorophore due to the presence of Ag
nanoparticles structures in the vicinity of the R6G laser dye. The
concentrations of R6G dye/MMA used are: 10-4M solutions were
prepared by dissolving the required quantity of the R6G dye in
MMAMonomer. Then Silver nanoparticles with 50 average particles
size were mixed with MMAmonomer with concentration of 0.3, 0.5,
0.7wt% to get R6G silver/MMA in liquid phase. The films were
deposited on glass substrates by dielectric barrier discharge plasma
jet. The Ag/R6G/PMMA nanocomposite thin films were
characterization by UV-Visible absorption spectra by using a double
beam UV-Vis-NIR Spectrophotometer and fluorescence
Spectrophotometer. The thin films surface morphological analysis is
carried out by employing an AFM and SEM. the structure analysis
are achieved by X-ray diffraction. The thickness of the films was
measured by optical interferometric method. AFM analysis shows
that the surface roughness of plasma polymerized pure PMMA thin
films was 2.7 nm and for (10-4 R6G + 0.7wt% Ag)Ag/R6G/PMMA
thin films was 4.16 nm. The SEM images were indicates that Ag
nanoparticles (NPs) disperse in the PMMA matrix with uniform
distribution and formed mostly spherical NPs and slightly
agglomerate. Also the silver nanoparticles with 0.7wt%
concentration enhances the absorption process by 2.3 times and the
fluorescence by 1.7 times. it can be conclude, that the addition of low
concentrations of silver nanoparticles to the PMMA/ R6G matrix was
changing the optical properties of the prepared nanocomposite thin
films.
In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp
... Show MoreLarge quantities of contaminated carwash wastewater are produced per day from carwash places. Extensively it contains large quantities of chemicals from detergents, oil, grease, heavy metals, suspended solids, types of hydrocarbons, and biological contents. A novel electrocoagulation treatment by foil electrodes was conducted to remove COD, turbidity, Total Dissolved Solids (TDS) from contaminated carwash wastewater and decrease its Electrical Conductivity (EC). A thin layer of aluminum foil is used as an electrode in this treatment process. The effects of different voltage and treatment times were studied. The best result was found at a voltage of 30 volts and treatment time 90 minute where the removal efficiency of COD
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More