Thin films of microcrystalline and nanocrystalline -silicon carbide and silicon, where deposited on glass substrate with substrate temperature ranging from 350-400C, with deposition rate 0.5nm per pulse, by laser induced chemical vapor deposition. The deposition induced by TEACO2 laser. The reactant gases (SiH4 and C2H4) photo decompose throughout collision associated multiple photon dissociate. Such inhomogeneous film structure containing crystalline silicon, silicon carbide and amorphous silicon carbide matrix, give rise to a new type of material nanocrystalline silicon carbide in which the optical transmittance is governed by amorphous SiC phase while nanocrystalline grain are responsible for the conduction processes. This new m
... Show MoreAbstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to de
... Show MoreThis study has been performed for knowing the nutritional and chemical content of one kind chamomile tea for infant and children available in the pharmacy. The results have been showed that the percentage of essential compounds which represented with moisture, protein, fat, carbohydrate, ash and calories as 7.09%,0.01%,0.01%,92,81%, 0.08% and 371,37 Kal./100g, respectively of dry weight. Also the results have been showed that the percentage of chamomile plant extract that added to the tea as 5.74%. And the result of chemical test for effective materials in alcoholic extract showed consist Tannis, Glycosides, Flavonoids, Alkialoids,and Resins.
Objective: The present study was aimed to develop a pH-triggered in situ gel for local release of lidocaine hydrochloride (lidocaine HCL) in the buccal cavity to improve the anesthetic effect of this amino amide drug which has very high water solubility. The formulations were introduced to the oral cavity as a spray to improve compliance and for easier administration.Methods: In this work, two grades of carbopol (934 and 940)-based in situ gel spray were designed. The formulations containing lidocaine HCl 5% were prepared by mixing different concentrations of carbopol with xanthan gum. Eight formulations were investigated and evaluated for gelation capacity, spray angle, volume of solution delivered per each actuation, rheological p
... Show MoreThis paper aims to study the chemical degradation of Brilliant Green in water via photo-Fenton (H2O2/Fe2+/UV) and Fenton (H2O2/Fe2+) reaction. Fe- B nano particles are applied as incrustation in the inner wall surface of reactor. The data form X- Ray diffraction (XRD) analysis that Fe- B nanocomposite catalyst consist mainly of SiO2 (quartz) and Fe2O3 (hematite) crystallites. B.G dye degradation is estimated to discover the catalytic action of Fe- B synthesized surface in the presence of UVC light and hydrogen peroxide. B.G dye solution with 10 ppm primary concentration is reduced by 99.9% under the later parameter 2ml H2O2, pH= 7, temperature =25°C within 10 min. It is clear that pH of the solution affects the photo- catalytic degradation
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More