In this research, Zinc oxide (ZnO)/epoxy nanocomposite was synthesized by simple casting method with 2wt. % ZnO concentration. The aim of this work was to study the effect of pH and composite dosage on the photocatalytic activity of ZnO/ epoxy nanocomposite. Scanning electron microscopy (SEM) technique images proof the homogeneous distribution of ZnO nanoparticles in epoxy. A synthesized nanocomposite samples were characterized by Fourier Transform Infrared spectrometer (FTIR) measurements. Two spectra for epoxy and 2wt.% ZnO/epoxy nanocomposites were similar and there are no new bonds formed from the incorporation of ZnO nanoparticles. Using HCl and NaOH were added to Methylene blue (MB) dye (5ppm) to gat pH values 3 and 8. The degradation of the dye was 90.816% were pH =8 after 180 min. under sun-light. The degradation was 6.131% were pH=3 after 240 min. under sun-light irradiation. It is found that the base solution help in accelerating the photocatalytic process, pH with high value provides greater concentration of hydroxyl ions which interact with h+ to form hydroxyl radicals OH- that give an enhancement degradation rate of dyes. The dose of ZnO was increased from 3g to 6g with Methylene blue MB (5ppm) the degradation was 94.3755% after 240 min. under sun-light irradiation. This means that increasing the dose of ZnO, the photocatalytic activity will be increased.
High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreAHA Al-Hilali, AAH Hamid, The Journal of Law Research, 2022