In this study, we introduce new a nanocomposite of functionalize graphene oxide FGO and functionalize multi wall carbon nanotube (F-MWCNT-FGO).The formation of nanocomposite was confirmed by FT-IR ,XRD and SEM. The magnitude of the dielectric permittivity of the (F-MWCNT-FGO) nanocomposite appears to be very high in the low frequency range and show a unique negative permittivity at frequencies range from 400 Hz to 4000Hz. The ac conductivity of nanocomposite reaches 23.8 S.m-1 at 100Hz.
In this work, two graphene oxide (GO) samples were prepared using the Hummers method with graphite (g) and KMnO4 (g) ratios of 1:3 (GO3) and 1:6 (GO6). The effect of oxidation degree on the structural, electrical, and dielectric properties of the GO samples was investigated. The structures of the GO samples were studied using various techniques, including X-ray diffraction (XRD), Fourier transform infrared (FT-IR) spectroscopy, scanning electron microscopy (SEM), and energy-dispersive X-ray spectroscopy (EDXS). XRD analysis revealed an increase in the interlayer spacing and a decrease in the number of layers of the samples with increasing oxidant content. The two GO samples have giant permittivity values of ~105 in the low-frequency
... Show MoreReading is one of the essential components of the English language. Countries that use English as a second language (ESL) sometimes have difficulties in reading and comprehension. According to many researches, mother tongue has proved some interferences with learning a second language. This study investigated the results of reading difficulties of young second language learners in terms of accuracy, comprehension, and rate using the Neale Analysis of Reading Ability test. The study was carried out in one of the High Schools for Boys in Hyderabad, India and included Grade five, aged 10-12 years. In order to understand the reading difficulties of English as a second language, a qualitative approach was employed. Interview, reading tes
... Show MoreSome new 2,5-disubsituted-1,3,4-oxadiazole derivatives with azo group were synthesized by known reactions sequence . The structure of the synthesized compounds were confirmed by physical and spectral means .
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More