In the present study, magnet silica-coated Ag2WO4/Ag2S nanocomposites (FOSOAWAS) were fabricated via a multistep method to address the drawbacks related to single photocatalysts (pure Ag2WO4 and pure Ag2S) and to clarify the significant influence of semiconductor heterojunction on the enhancement of visible-light-driven organic degradation. Different techniques were performed to investigate the elemental composition, morphology, magnetic and photoelectrochemical properties of the fabricated FOSOAWAS photocatalyst. The FOSOAWAS photocatalyst (1 g/L) exhibited excellent photodegradation efficiency (99.5%) against Congo red dye (CR = 20 ppm) after 140 min of visible-light illumination. This result confirmed the ability of the heterojunction between Ag2WO4 and Ag2S species to improve the efficiency of the photogenerated electron/hole pair separation and to reduce their recombination. The kinetics studies of CR photoreaction suggested that the photodegradation rate of the FOSOAWAS photocatalyst was 3.26 and 2.94 times higher than that of pure Ag2WO4 and Ag2S NPs, respectively. The CR dye was investigated under various operating conditions (FOSOAWAS dosage, CR concentration, and pH of solution). The trapping experiments proved the significant roles of H2O2, •OH, and h+ oxidants in the photoreaction of CR dye. The proposed mechanism explains that the Type I heterojunction between Ag2WO4 and Ag2S semiconductors was responsible for the improved photocatalytic activity of the FOSOAWAS nanocomposite. Finally, the reusability and stability experiments proved the sufficient stability and facile separation of FOSOAWAS heterojunction, which may be employed in practical applications.
The study aims to identify the educational research obstacles as perceived by the faculty members at the universities of south in the west bank. As for study population, it included all (60) faculty-member in the colleges of education (bait lahem, alahliyah, al-khalil, and al-Quds almaftoha). To collect study data, the researcher used a questionnaire that consisted of (43) item; it has categorized into seven-domains: academic working conditions, academic management, resources and information, faculty members, publication, planning, and funding educational research. The findings revealed that Educational research obstacles were high with an average of (4, 39), no significant differences among sample averages and stander deviations on the
... Show MoreECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreAlthough the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreThis research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show More