A new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO4,HNO3,HCl,H2SO4) while L.O.D 30, 50.01,29.75,51.41 μg/sample for HClO4,H2SO4,HCl,HNO3 respectively from the stepwise dilution for minimum concentration of lowest concentration in linear dynamic range of the calibration graph. The correlation coefficient (r) was 0.9891, 0.9930, 0.9917, 0.9940 while percentage linearity (%r2) was 97.85%, 98.81%, 98.61%, 98.36% for HClO4, H2SO4, HCl, HNO3 respectively. R.S.D. % for the repeatability (n=5) was < 2% for determination of Hydronium ion with concentration 20 and 80 mMol.L-1. The method was applied successfully for the determination of Hydronium ion in commercial samples. Using paired t-test between the newly developed method and classical method; shows that there were no significant differences between either methods. On this basis the new method can be accepted as an alternative analytical method for determination of Hydronium ion in commercial samples.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe conjugate coefficient optimal is the very establishment of a variety of conjugate gradient methods. This paper proposes a new class coefficient of conjugate gradient (CG) methods for impulse noise removal, which is based on the quadratic model. Our proposed method ensures descent independent of the accuracy of the line search and it is globally convergent under some conditions, Numerical experiments are also presented for the impulse noise removal in images.
The present study introduces description of a new species of leafhopper of genus Assuita Lindberg; 1969. This study includes external morphological characters and the spotting patterns and photos of vertex face pronotum, mesonotum, fore wing, hind wing and the shape of male abdominal abodeme, also aedeagus, connective, genital style and genital plate.
Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreIn the present work, the effect of isolated dust particles (FeO) with radius of the grain 0.1μm - 0.5μm of main plasma characteristics are investigated experimentally in direct current system by using magnetic field. The present of dust particle in the air plasma did effect on Paschen minimum and on the plasma properties in low pressure region. The effect of dust particles on discharge voltage, discharge current, plasma potential, floating potential, electron density, electron temperature and Debye length was investigation by using magnetic field. The measurements of parameters are taken by four cylindrical Langmuir probes. The results show the present of dust causes decreasing in discharge voltage with increase pressure while the disc
... Show MoreThis paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
This paper deals with constructing mixed probability distribution from mixing exponential
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show More