Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room temperature. The magnitude of electrical conductivity was increased with the increase in the salt concentration and temperature. The blend electrolytes have a high dielectric constant at lower frequencies which may be attributed to the dipoles providing sufficient time to get aligned with the electric field, resulting in higher polarization. The reduction of activation energy (Ea) suggests that faster-conducting electrolyte ions want less energy to move.
In this work, p-n junctions were fabricated from highly-pure nanostructured NiO and TiO2 thin films deposited on glass substrates by dc reactive magnetron sputtering technique. The structural characterization showed that the prepared multilayer NiO/TiO2 thin film structures were highly pure as no traces for other compounds than NiO and TiO2 were observed. It was found that the absorption of NiO-on-TiO2 structure is higher than that of the TiO2-on-NiO. Also, the NiO/TiO2 heterojunctions exhibit typical electrical characteristics, higher ideality factor and better spectral responsivity when compared to those fabricated from the same materials by the same technique and with larger particle size and lower structural purity.

Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More