In this paper, Activated Carbon was successfully prepared from local Iraqi material namely corns stalks .Zinc chloride ZnCl2 was used as activating agent with different concentrations (20%, 40%, 60%) for 72 hours. followed by carbonization at 450 C for (2) hour. UV-Spectrophotometer used for measuring absorbance of methylene blue solutions before and after adsorption. the maximum amount adsorbed for methylene blue material of the prepared activated Carbon was studied by Langmuir adsorption isotherm. Other characteristics of the resulting activated Carbon also discussed, such as pH, Moisture Content and ash content. Finally Activated carbon prepared in this work has good properties compared to the standard samples in such a way it could be
... Show MoreCarbon nanospheres (CNSs) were successfully prepared and synthesized by Catalytic Chemical Vapor Deposition (CCVD) by using camphor as carbon source only, over iron Cobalt (Fe-Co) saturated zeolite at temperature between (700 oC and 900 °C), with different concentrations of camphor, and reaction time. The synthesized CNSs were characterized using Scanning Electron Microscopy (SEM), X-ray diffraction spectroscopy (XRD), and Fourier Transform Infrared (FTIR). The carbon spheres in different sizes between 100 nm and 1000 nm were investigated. This work has done by two parts, first preparation of the metallic catalyst and second part formation CNSs by heat treatment.
The corrosion behavior of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) has been studied. The corrosion inhibition of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) by Ciprofloxacin has been investigated. Specimens were exposed in the acidic media for 7 hours and corrosion rates evaluated by using the weight loss method. The effect of temperature (from 283 ºK to 333 ºK), pH (from 1to 6), inhibitor concentration (10-4 to 10-2) has been studied. It was observed that sulphuric acid environment was most corrosive to the metals because of its oxidizing nature, followed by hydrochloric acid. The rate of metal dissolution increased with incre
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show More