In this work, CdS/TiO2 nanotubes composite nanofilms were successfully synthesized via electrodeposition technique. TiO2 titania nanotube arrays (NTAs) are commonly used in photoelectrochemical cells as the photoelectrode due to their high surface area, excellent charge transfer between interfaces and fewer interfacial grain boundaries. The anodization technique of titanium foil was used to prepare TiO2 NTAs photoelectrode. The concentration of CdCl2 played an important role in the formation of CdS nanoparticles. Field emission scanning electron microscopy (FESEM) shows that the CdS nanoparticles were well deposited onto the outer and inner of nanotube at 40 mM of CdCl2. X-ray diffraction (XRD) and energy dispersive X-ray (EDX) analyses wer
... Show MorePlastic soil exhibits unfavorited geotechnical properties (when saturation), which causes negative defects to engineering structures. Different attempts (included various materials) were conducted to proffer solutions to such defects by experimenting in practical ways. On one hand, these attempts aimed to improve the engineering characteristics of plastic soil, and on the other hand, to use problematic waste materials as a stabilizer, like cement kiln dust, and to reduce environmental hazards. This paper explored the shrinkage, plasticity, and strength behavior of plastic soil enhanced with cement dust. The cement dust contents were 0%, 5%, 10%, 15% and 20% by dry weight of soil. An experimental series of shrinkage and p
... Show MoreIn this paper we have presented a comparison between two novel integral transformations that are of great importance in the solution of differential equations. These two transformations are the complex Sadik transform and the KAJ transform. An uncompressed forced oscillator, which is an important application, served as the basis for comparison. The application was solved and exact solutions were obtained. Therefore, in this paper, the exact solution was found based on two different integral transforms: the first integral transform complex Sadik and the second integral transform KAJ. And these exact solutions obtained from these two integral transforms were new methods with simple algebraic calculations and applied to different problems.
... Show MoreThe employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreThis article dealt with the evolutionary interpretation in three parts: First, it focused on the conceptual framework of evolutionary interpretation of International Treaties, its philosophical and legal foundation and its determinants. As for the second topic, it dealt with the position of the International Court of Justice from the evolutionary interpretation, studying and analyzing its precedents in this aspect and the resulting proposed and adopted criteria. The third topic dealt with the position of the judiciary of human rights through analyzing the rulings of the European Court of Human Rights and the Inter - American Court of Human Rights based on the criteria that were produced by the judicial practices, which varied according t
... Show MoreThe present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show More