In this work the fabrication and characterization of poly(3-hexylthiophene) P3HT-metallic nanoparticles (Ag, Al). Pulsed Laser Ablation (PLA) technique was used to synthesis the nanoparticles in liquid. The Fourier Transformer Infrared (FTIR) for all samples indicate the chemical interaction between the polymer and the nanoparticles. Scanning Electron Microscopic (SEM) analysis showed the particle size for P3HT-AgNps samples between 44.50 nanometers as well the spherical structure. While for P3HT-AlNps samples was flakes shape. Energy Dispersive X-ray (EDX) spectra show the existing of amount of metallic nanoparticles.
It is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water
... Show MoreUpper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreTheoretically description of the electron transfer of the electron transfer of met/mol has been investigated in this work according to the quantum theory. By using a model that is derived depending on the first order perturbation theory, the rate constant at met/mol interface can be calculated with the calculated reorganization energy. The reorganization energy that is evaluated according to the outer sphere model is based on the electstatistics potential of the molecular donor and acceptor. The molecular parameters introduced in this model are the molecular weight, mass, density, and radius of molecule have been evaluated according to the apparent molar volume using spherical approach. Th
... Show MoreWe found that 4,5- diphenyl- 3(2- propynyl) thio- 1??-triazole [1? forms a complex with Pd (11) ion of ratio 1:1 which absorbs light in CH2CI2 at 400 nm, and 4,5- diphenyl- 3(2- propenyl) thio- 1,2,4- triazole [II] forms complexes with Pd (II) ion of ratio 1:1 which absorbs light at 390 nm, and of ratio 2:1 which absorbs light at 435 nm. On the other hand, we found that the new derivative 4- phenyl- 5( p- amino phenyl) -3- mercapto- 1,2,4- triazole ?111? forms complexes with Cu (II) ion of the ratio 1:1 which absorbs light at 380 nm, with Ni (II) ion of the ratio 3:1 which absorbs light at 358 nm; and with Co (11) ion of the ratio 3.2:1 which absorbs light at 588 nm. The ratio of the complexes were determined by measuring the electronic spe
... Show MoreWith the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show More