Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher inactivation rate observed for gram-negative bacteria and reduced resistance of membrane due to reactive oxygen species generated by thermal oxidation.
Four samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,
... Show MoreElectro coagulation treatment was used for zinc removal from electroplating wastewater of the State Company for Electrical Industries . This wastewater, here consists zinc ions with maximum concentration in solution of 90 ppm .
The parameters that influenced the wastewater treatment are: current density in the range 1-1.4 mA/cm2, pH in the range 5-10, temperature in the range 25-45°C and time in the range 10-180 minute.
The research is a laboratory experimental type using batch system for electrical process with direct current. The cell comprised of aluminum electrode as anode and stainless steel electrode as cathode. Thirty experiments and one hundred fifty sample lab tests were carried out in this research
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreMicroorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreIn this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The present work aims to study the possibility of utilization a forward osmosis desalination process as an alternative method to extract water from brine solution rejected from reverse osmosis process.
Experiments conducted in a laboratory–scale forward osmosis (FO) unit in cross flow flat sheet membrane cell yielded water flux ranging from (0.0315 to 0.56 L/m2 .min) when using CTA membrane,and ranging from (0.419 to 2.785 L/m2 .min) for PA membrane under 0.4 bar. Two possible membrane orientations were tested. Sodium chloride with high concentrations was used as draw solution solute. The effect of membrane orientation on internal concentration polarization (ICP) was studied. Two regimes of ICP; dilutive and concentrative were desc
Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show More