in this paper, the current work was devoted to the manufacture of TiO2 nanoparticles doped with manganese, synthesis by the sol-gel technique using a dip-conting device, for their hydrophilic properties and photocatalytic activity, and the products were characterized by X-ray diffraction, scanning electron microscopy, and Uv-Visible absorption, and the results XRD showed an phase Anatase , and the results of the SEM Explained the shape of the morphology of the samples after the doping process compared with pure TiO2, and the results of a shift in light absorption from ultraviolet rays to visible light were evident. The results showed that the thin films have a high wettability under visible rays proven to have excellent optical stimulation in the visual area, making the application of a thin film as a self-cleaning material an attractive option.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreA modified water injection technique has organized by this study to improve oil recovery of the Mishrif reservoirs using polymerized alkaline surfactant water (PAS-Water) injection. It is planned to modify the existing water injection technology, first to control and balance the hazardous troublemaker reservoir facies of fifty-micron pore sizes with over 500 millidarcies permeability, along with the non-troublemaker types of less than twenty micron pore sizes with 45 to 100 millidarcies permeability. Second to control Mishrif reservoirs rock-wettability. Special core analysis under reservoir conditions of 2250 psi and 90 °C has carried out on tens of standard core plugs with heterogeneous buildup, using the proposed renewal water f
... Show MoreExtemporization is the ability of the actor to reflect his internal being. It gives a sort of confidence and an ability to show the personal countenance of the role away from tension and rigidity. By extemporization, it is possible to deal with and criticize the real living life so it is an intellectual, emotional, sensual, and perceptive process connected with the psychological energy and the emotional memory and all this goes under the control of the director and his instigations and instructions depending on what the text involves of intellectual, social and psychological motivators so it primarily depends on talent, chance and discussion. The research involves four chapters; the first contains the problem
... Show MoreA new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
In this investigation, the mechanical properties and microstructure of Metal Matrix Composites (MMCs) of Al.6061 alloy reinforced by ceramic materials SiC and Al2O3 with different additive percentages 2.5, 5, 7.5, and 10 wt.% for the particle size of 53 µm are studied. Metal matrix composites were prepared by stir casting using vortex technique and then treated thermally by solution heat treatment at 530 0C for 1 hr. and followed by aging at 175 0C with different periods. Mechanical tests were done for the samples before and after heat treatment, such as impact test, hardness test, and tensile test. Also, the microstructure of the metal matrix composites was examine
... Show More