We manufactured the nanoparticles light emitting diode (NPs-LED) for organic and inorganic semiconductors to achieve electroluminescence (EL). The nanoparticles of Europium oxide(Eu2O3) were incorporated into the thin film layers of the organic compounds, poly(3,4,- ethylene dioxythiophene)/polystyrene sulfonic acid (PEDOT:PSS), N,N’–diphenyl-N,N’ –bis(3-methylphenyl)-1,1’-biphenyl 4,4’- diamine (poly TPD) and polymethyl methacrylate (PMMA), by the spin coating and with the help of the phase segregation method. The EL of NPs-LED, was study for the different bias voltages (20, 25, 30) V at the room temperature, from depending on the CIE 1931 color spaces and it was generated the white light at 20V, t
... Show MoreThe protozoan parasite Entamoeba histolytica is a causative agent of amoebiasis, where it causes millions of cases of dysentery and liver abscess each year. Metronidazole is a drug of choice against amoebiasis. The drug is a choice because of its efficacy and low cost, but at the same time it causes several adverse side effects; therefore, it is important to find effective medications to treat amoebiasis without any complications or any side effects. The aim of this study is to evaluate the effectiveness of different concentrations (50, 75 and 100 µg/ml) of silver nanoparticle (AgNPs) against trophozoites stages of E. histolytica in vitro. The results showed a significant decrease (p ? 0.05) in numbers of trophozoites stages after treated
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreAmidst the changes resulting from the subject matter of expression in art. The necessity of searching for the expressive features of thought that leaves different imprints with aesthetic features and values which called for re-modifying the expressive vision of contemporary drawings. Therefore, this research has been concerned with the study of (abstract expressive features in the drawings of (Serwan Baran) and (Eric Barto) - a comparative study), and the research includes four chapters. The first chapter is devoted to explaining the research problem, its importance, need, purpose, and limits, then determining the most important terms mentioned in it. Where the research problem dealt with the subject of abstract expressive feature
... Show More