Carbon nanotubes were prepared by an arc-discharge method,
under different values of pressure of oxygen gas. The structure of
multi-walled carbon nanotubes powders has been characterized by
low-angle X-ray diffraction .The morphology of carbon nanotube
powder was examined by transmission electron microscope. The
capacitance-voltage and current- voltage (dark and illumination
current) characterization were measured under different values of
pressure (10-3, 10-4, 10-5) mbar of oxygen gas
The reclamation of makeup water is studied in terms of breakthrough time (i.e., the leakage of the cations). Makeup water was subjected to lab-scale ion exchangers of two types: strong acid cation and weak base anion exchanger. The experimental investigation was directed to study the ion exchanger performance in terms of four different parameters (i.e., copper concentration, total dissolved solids (TDS), feed rate and bed depth). Box-Wilson composite rotatable design was adopted in designing the experiments. Breakthrough times of the effluent stream are measured in terms of copper concentration of 2 to 25 ppm, TDS concentration of 250 to 1250 ppm, feed rate of 0.38 to 5.34 l/h and bed depth of 5 to 70 cm. Simulation the effect of the stu
... Show MoreEstablishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the cont
... Show MoreArtichoke (Cynara scolymus L.) is a nutritious vegetable that grown all over the world. It is a promising herbal plant, rich in bioactive components. It is considered as medicinal plant due to its nutritional and phytochemical composition, especially high proportion of phenolic compounds. The primary aim of this study was to achieve chemical profile analyses of artichoke for different phytochemcials, especially Scolymoside and Cynaroside. Methanolic crude was extracted from Artichoke leaves by rotary evaporator and separated by column chromatography. The fractions monitored by Thin Layer Chromatography (TLC), and identified in High-Pressure Liquid Chroma
... Show MoreThis study is concerned with the derivation of differential equation of motion for the free coupled vertical – torsional and lateral vibration of opened thin-walled curved beams. The curved beam to be considered in this study is of isotropic opened thin – walled (I) section with equal top and bottom flanges. The derivation depends on Hamilton's principle which required finding the potential and kinetic energy of the curved beam section due to internal stresses and all types of movements (Vertical,Torsional and Lateral) .The effect of restrained warping displacement is also considered in this study. Three differential equations are derived for vertical, torsional and lateral movement .and approximate solutions are developed by using the
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More