In this research, Zinc oxide (ZnO)/epoxy nanocomposite was synthesized by simple casting method with 2wt. % ZnO concentration. The aim of this work was to study the effect of pH and composite dosage on the photocatalytic activity of ZnO/ epoxy nanocomposite. Scanning electron microscopy (SEM) technique images proof the homogeneous distribution of ZnO nanoparticles in epoxy. A synthesized nanocomposite samples were characterized by Fourier Transform Infrared spectrometer (FTIR) measurements. Two spectra for epoxy and 2wt.% ZnO/epoxy nanocomposites were similar and there are no new bonds formed from the incorporation of ZnO nanoparticles. Using HCl and NaOH were added to Methylene blue (MB) dye (5ppm) to gat pH values 3 and 8. The degradation of the dye was 90.816% were pH =8 after 180 min. under sun-light. The degradation was 6.131% were pH=3 after 240 min. under sun-light irradiation. It is found that the base solution help in accelerating the photocatalytic process, pH with high value provides greater concentration of hydroxyl ions which interact with h+ to form hydroxyl radicals OH- that give an enhancement degradation rate of dyes. The dose of ZnO was increased from 3g to 6g with Methylene blue MB (5ppm) the degradation was 94.3755% after 240 min. under sun-light irradiation. This means that increasing the dose of ZnO, the photocatalytic activity will be increased.
The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show More