In this study, Zinc oxide nanostructures were synthesized via a hydrothermal method by using zinc nitrate hexahydrate and sodium hydroxide as a precursor. Three different annealing temperatures were used to study their effect on ZnO NSs properties. The synthesized nanostructure was characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), Atomic force microscope (AFM), and Fourier Transform Infrared Spectroscopy (FTIR). Their optical properties were studied by using UV -visible spectroscopy. The XRD analysis confirms that all ZnO nanostructures have the hexagonal wurtzite structure with average crystallite size within the range of (30.59 - 34.52) nm. The crystallite size increased due to the incensement of annealing temperature. FESEM analysis indicates that ZnO has hexagonal shape of cylindrical pores, plate-like nanocrystals and Nanorods. AFM analysis shows that the average surface roughness of ZnO Nanostructures increases from 3.96 to 19.1 nm with the increase of annealing temperature. The FTIR peaks indicate successful preparation of ZnO Nanostructures. The FTIR method was used to analyses the chemical bonds which conformed the present of the Zn-O group in the region between (400-500) cm-1. The UV-visible showed a red shift in the absorption spectra related to the shift in the energy gap related to increase in the particle size. the band gap energy has been calculated from the optical absorption spectra. The annealing process has been fond more effective on the value of energy gap. As the annealing temperature increases, the value of energy gap, increases as well; from (3.12to 3.22) eV. The prepared Nanostructure is used for antibacterial property. It shows strong antibacterial activity against S. aureus and P.aeuruginosa bacteria by the agar disc diffusion method. The white precipitate of ZnO NSs has superior antibacterial activity on gram-positive (S. aureus) than the gram-negative (P.aeuruginosa) bacteria.
Periodontitis is a multifactorial chronic inflammatory disease that affects tooth-supporting soft/hard tissues of the dentition. The dental plaque biofilm is considered as a primary etiological factor in susceptible patients; however, other factors contribute to progression, such as diabetes and smoking. Current management utilizes mechanical biofilm removal as the gold standard of treatment. Antibacterial agents might be indicated in certain conditions as an adjunct to this mechanical approach. However, in view of the growing concern about bacterial resistance, alternative approaches have been investigated. Currently, a range of antimicrobial agents and protocols have been used in clinical management, but these remain largely non-v
... Show MoreHuge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig
... Show MoreThis research aims to clarify the advantages of statistical sampling method and provided the scientific basis of the auditor was able to defend the future of any objection to the validity of his opinion on the financial statements of the restrictions of personal rule as much as possible during the stages of the general Company for Cotton industries.Aresearc An applied study in the Board of supreme Audit (the accounts of the cotton industry), have been used, a researcher at the theoretical side to achieve the objectives of the research methodology descriptive inference in the collection and analysis of financial statements of the circle (sample) for the financial year (2008). To achieve the objectives of the field study was designed
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show More