This study includes the preparation of the ferrite nano ferrite CuxAl0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) M using the auto combustion method (sol-gel), and citric acid was used as fuel for auto combustion. The ferrite samples were checked by X-ray diffraction (XRD), Field Emission Scanning Electron Microscopes (FE-SEM), and energy dispersive X-ray analyzer (EDX). They showed that the prepared compound has a face-centered cubic structure (FCC). The lattice constant increases with an increase in the percentage of doping of the copper ions, and a decrease for the aluminum ion and that the compound is porous and its grains are spherical, and there are no other elements other than the elements involved in the preparation of the compound. Which means that it is of high purity. The gas sensing system revealed that the nano ferrite has good sensitivity to hydrogen sulfide (H2S) gas.
Particulate matter (PM) emitted from diesel engine exhaust have been measured in terms of mass, using
99.98 % pure ethanol blended directly, without additives, with conventional diesel fuel (gas – oil),to
get 10 % , 15 %, 20 % ethanol emulsions . The resulting PM collected has been compared with those
from straight diesel. The engine used is a stationary single cylinder, variable compression ratio Ricardo
E6/US. This engine is fully instrumented and could run as a compression or spark ignition.
Observations showed that particulate matter (PM) emissions decrease with increasing oxygenate
content in the fuel, with some increase of fuel consumption, which is due to the lower heating value of
ethanol. The reduction in
The single-particle level densities for Th 232
90 , at certain exciton number, are
calculated in terms of Equidistant Space Model, ESM, and NON-ESM, of Fermi
Gas Model. It is found that the single particle level density, g, has no longer a
constant value and becomes an energy dependent on the contrary with NON-ESM.
The finite depth of the nuclear well and pairing corrections are examined with
behavior of the single level density for both models. The particle-hole state density
has been calculated, by means of the energy dependence of excited particles and
hole level densities, for one and two fermions systems and different exciton number
in Th 232
90 . The present results are compared between two models with
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MoreThe gaps and cracks in an image result from different reasons and affect the images. There are various methods concerning gaps replenishment along with serious efforts and proposed methodologies to eliminate cracks in diverse tendencies. In the current research work a color image white crack in-painting system has been introduced. The proposed inpainting system involved on two algorithms. They are Linear Gaps Filling (LGF) and the Circular Gaps Filling (CGF). The quality of output image depends on several effects such as: pixels tone, the number of pixels in the cracked area and neighborhood of cracked area and the resolution the image. The quality of the output images of two methods (linear method: average Peak Signal to Noise Ratio (PS
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreIn the current research work, a method to reduce the color levels of the pixels within digital images was proposed. The recent strategy was based on self organization map neural network method (SOM). The efficiency of recent method was compared with the well known logarithmic methods like Floyd-Steinberg (Halftone) dithering and Octtrees (Quadtrees) methods. Experimental results have shown that by adjusting the sampling factor can produce higher-quality images with no much longer run times, or some better quality with shorter running times than existing methods. This observation refutes the repeated neural networks is necessarily slow but have best results. The generated quantization map can be exploited for color image compression, clas
... Show MoreWe will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show More