The prepared nanostructure SiO2 thin films were densified by two techniques (conventional and Diode Pumped Solid State Laser (DPSS) (532 nm). X-ray diffraction (XRD), Field Emission Scanning electron microscopy (FESEM), and Atomic Force Microscope (AFM) technique were used to analyze the samples. XRD results showed that the structure of SiO2 thin films was amorphous for both Oven and Laser densification. FESEM and AFM images revealed that the shape of nano silica is spherical and the particle size is in nano range. The small particle size of SiO2 thin film densified by DPSS Laser was (26 nm) , while the smallest particle size of SiO2 thin film densified by Oven was (111 nm).
This article includes the preparation of luminescence materials from rare earth (Eu ) ion doping Yttrium Oxide (Y2O3) 70% and SiO2 25% and study the characteristics of phosphors for ultraviolet to visible conversion. The phosphor materials have been synthesized by two steps: Preparing the powder by solid state method using Y2O3, SiO2 and Eu2O3 with doping materials concentration (70%, 25% and 5%) respectively and different calcination temperature (1000, 1200 and 1400 oC).
The second step is to prepare the colloid solution by dispersing the produced powder in a polyvinyl alcohol solution (4%) .
Powde
... Show MoreModern asphalt technology has adopted nanomaterials as an alternative option to assert that asphalt pavement can survive harsh climates and repeated heavy axle loading during service life and prolong pavement life. This work aims to elucidate the behavior of the modified asphalt mixture fracture model and assess the fatigue and Rutting performance of Hot Mix Asphalt (HMA) mixes using the outcomes of indirect Tensile Strength (IDT), Semicircular bend (SCB) and rutting resistance; for this, a single PG (64−16) nanomodified asphalt binder with 5 % SiO2 and TiO2 have been investigated through a series of laboratory tests, including: Resilient modulus, Creep compliance, and tensile strength, SCB, and Flow Number (FN) to study their potential
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In this research prepare membranes pure silicon carbide (SiC) as well as gas Alloy (ammonia) and using a laser was leaked membrane of glass flooring. To Drasesh optical properties of membranes prepared depending on the technique (Swanepoel) and Adhrt results obtained in general increased permeability pure silicon membranes
Aluminum oxide thin films were prepared by dc reactive sputtering technique using different mixing ratios of argon and oxygen gases (90:10, 70:30, 50:50, 30:70, and 10:90). These films were characterized to introduce their crystalline structures, surface morphology, and elemental composition. A progressive transition occurs from a predominantly amorphous to a highly crystalline Al2O3 film as the oxygen content in the Ar:O2 gas mixture is increased. Increasing the oxygen content leads to a progressive decrease in surface roughness, resulting in smoother and more uniform films with finer granular features. The oxygen-rich environments yield the smoothest surfaces, while argon-rich environments result in significantly rougher surfaces. These f
... Show More