The ZnO nanoparticles were synthesized at various precursor concentrations i.e. 0.05, 0.1, and 0.5 M by biosynthesis method based on Pometia pinnata Leaf Extracts. Initial nanoparticle concentration influenced the optical bandgap, shape, and structure of nanoparticles. The photodegradation process was carried out under UV illumination. The efficiency of MB degradation was determined by measuring the decrease in MB concentration and by analyzing the optical absorption at 663 nm recorded by UV-Vis spectroscopy. Results showed that the biosynthesized ZnO nanoparticles exhibited efficient photodegradation of MB, with a maximum degradation rate of 80% after 90 minutes of exposure to UV-C light. The study highlights the potential of Pometia pinnata leaf extracts as a low-cost and eco-friendly alternative for synthesizing ZnO nanoparticles for use in environmental remediation processes
Objecte The study aims to test the effect of using the appropriate quantitative method of demand forecasting in improving the performance of supply chain of the aviation fuel product ( The study sample), One of the products of the Doura refinery (The study site), By testing a set of quantitative methods of demand forecasting using forecasting error measurements, and choosing the least faulty, most accurate and reliable method and adept it in the building chain.
Is the study of problem through a starting with the fol
... Show MoreThe research shows the importance of orientation towards the formulation of the green strategy and its effect in determining the behavior of the green municipal institution in Babel governorate. The research highlighted the formulation of the green strategy as an important variable, especially today, the trend towards protecting the environment and minimizing the damage resulting from the delivery of services, and through it also the type of green behavior or performance adopted by the municipal institution and the emergence of the need for a strategy that is not harmful to the environment. The research took the sample intentionally comprehensive size of 222 personnel of municipal institutions and some formations concerned with t
... Show MoreThe global oil market is one of the most important markets in the world and occupies especially for countries consuming and producing countries, and the status of understanding of the mechanism for determining prices in the market help to stand on many factors affecting oil demand and supply of oil and geopolitical factors, climate and alternative sources of energy .. etc. factors, and that the main objective of the research is to study the causes and results left behind by the oil price shocks in the world market, and the movement of these factors be through a cycle of energy that explain the strength of competition between these factors and their effects on prices, when demand increases evolution Large image leads to significan
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MorePiled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced. The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.