Because of the quick growth of electrical instruments used in noxious gas detection, the importance of gas sensors has increased. X-ray diffraction (XRD) can be used to examine the crystal phase structure of sensing materials, which affects the properties of gas sensing. This contributes to the study of the effect of electrochemical synthesis of titanium dioxide (TiO2) materials with various crystal phase shapes, such as rutile TiO2 (R-TiO2NTs) and anatase TiO2 (A-TiO2NTs). In this work, we have studied the effect of voltage on preparing TiO2 nanotube arrays via the anodization technique for gas sensor applications. The results acquired from XRD, energy dispersion spectroscopy (EDX), and field emission scanning electron microscopy (FE-SEM) elucidate that TiO2 was created. In addition, systematically examining the gas detection properties was also done. The gas sensor was produced from TiO2 nanotubes, and the gas-detecting features were directed at nitrogen dioxide (NO2), which is a hazardous gas. The sensor formed from TiO2 nanotubes detects NO2 gas at various temperatures, from room temperature to 300 oC, and it has good sensitivity to this gas. The results exhibit that the gas sensor that was synthesized at 30 V has good sensitivity and a short response time at room temperature for NO2 gas sensing.
The new of compounds synthesized by sequence reactions starting from a reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride to produce the compounds [I]a,b, then the compounds[I]a,b reacted with sodium azide to yield compounds[II]a,b that reacted 1,3-dipolarcycloaddition reaction with acrylic acid to give compounds [III]a,b these compounds reacted with methanol led to ester compounds[IV]a,b then reacted with hydrazine to give acid hydrazide [V]a,b . Finally compounds [V]a,b reacted with aromatic aldehydes to product shiff bases derivatives. The compounds characterized by mp. , IR, 1HNMR in addition to mass spectroscopy for some of them the liquid crystals properties were studied by using polarized optical microsco
... Show MoreMansuriya Gas field is an elongated anticlinal structure aligned from NW to SE, about 25 km long and 5-6 km wide. Jeribe formation is considered the main reservoir where it contains condensate fluid and has a uniform thickness of about 60 m. The reservoir is significantly over-pressured, (TPOC, 2014).
This research is about well logs analysis, which involves the determination of Archie petrophysical parameters, water saturation, porosity, permeability and lithology. The interpretations and cross plots are done using Interactive Petrophysics (IP) V3.5 software.
The rock parameters (a, m and n) values are important in determining the water saturation where (m) can be calcul
... Show MoreDouble hydrothermal method was used to prepare nano gamma alumina using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, CTAB (cetyltrimethylammonium bromide) as surfactant, and variable acids: weak acids like; citric, and acitic acids, and strong acids like; hydrochloric and nitric acids as a bridge between aluminum salts and surfactant. Different crystallization times 12, 24, 48, and 72 hrs were applied. All the batches were prepared at pH equals to 9. XRD diffraction technique was used to investigate the crystalline nano gamma alumina pure from surfactant. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the average p
... Show MoreIn this study, a proposed process for the utilization of hydrogen sulphide separated with other gases from omani natural gas for the production of sulphuric acid by wet sulphuric acid process (WSA) was studied. The processwas simulated at an acid gas feed flow of 5000 m3/hr using Aspen ONE- V7.1-HYSYS software. A sensitivity analysis was conducted to determine the optimum conditions for the operation of plant. This included primarily the threepacked bed reactors connected in series for the production of sulphur trioxidewhich represented the bottleneck of the process. The optimum feed temperature and catalyst bed volume for each reactor were estimated and then used in the simulation of the whole process for tw
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.