Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreBackground: Interleukine-2 is a multifunctional cytokine, considered a central regulator of host resistance against a variety of pathogens and has been recently demonstrated to exert an active role in the pathogenesis of periodontal diseases. The purpose of this study was to evaluate the effect of scaling and root planning on level of IL-2 in serum and saliva of patients with chronic generalized periodontitis, in relation to clinical parameters. Materials and Methods: A total of 50 subjects were enrolled, of which 25 had chronic generalized periodontitis and 25 periodontally healthy subjects as control. The clinical parameters included: gingival index, pocket probing depth, clinical attachment level and bleeding on probing. The level of
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe organation ⁄monomer N-naphthylacrylamide (NAA) was prepared; subsequently the synthesized monomer was successfully copolymerized with acrylicacid (AA) and methylacrylate (MA) by free radical technique using dry benzene as solvent and benzoyl peroxide (BPO) as initiator. The overall conversion was kept low (≤ 10% wt/wt) for all studies copolymers samples. The synthesized monomer and copolymers were characterized using Fourier transform infrared spectroscopy (FT-IR), and their thermal properties were studied by DSC and TGA. The copolymers compositions were determined by elemental analysis. Kelen-Tudes and Finmman-Ross graphical procedures were employed to determine the monomers reactivity ratios. The der
... Show MoreThe organation ⁄monomer N-naphthylacrylamide (NAA) was prepared; subsequently the synthesized monomer was successfully copolymerized with acrylicacid (AA) and methylacrylate (MA) by free radical technique using dry benzene as solvent and benzoyl peroxide (BPO) as initiator. The overall conversion was kept low (≤ 10% wt/wt) for all studies copolymers samples. The synthesized monomer and copolymers were characterized using Fourier transform infrared spectroscopy (FT-IR), and their thermal properties were studied by DSC and TGA. The copolymers compositions were determined by elemental analysis. Kelen-Tudes and Finmman-Ross graphical procedures were employed to determine
... Show More