The DC electrical conductivity properties of Ge60Se40-xTex alloy with x = 0, 5, 10, 15 and 20). The samples were formed in the form of discs with the thickness of 0.25–0.30 cm and the diameter of 1.5 cm. Samples were pressed under a pressure of 6 tons per cm2 , using a ton hydraulic press. They were prepared after being pressed using a ton hydraulic press using a hydraulic press. Melting point technology use to preper the samples. Continuous electrical conductivity properties were recorded from room temperature to 475 K. Experimental data indicates that glass containing 15% Te has the highest electrical conductivity allowing maximum current through the sample compared to Lu with other samples. Therefore, it is found that the DC co
... Show MoreAl-Dalmaj marsh and the near surrounding area is a very promising area for energy resources, tourism, agricultural and industrial activities. Over the past century, the Al-Dalmaje marsh and near surroundings area endrous from a number of changes. The current study highlights the spatial and temporal changes detection in land cover for Al-Dalmaj marsh and near surroundings area using different analyses methods the supervised maximum likelihood classification method, the Normalized Difference Vegetation Index (NDVI), Geographic Information Systems(GIS), and Remote Sensing (RS). Techniques spectral indices were used in this study to determine the change of wetlands and drylands area and of other land classes, th
... Show MoreSelect 30 isolate from Bacillus to detect the ability to produce pullulanase enzyme in liquid and solid state fermentation, and use the isolate Bacillus licheniformis (Bs18) because the highest production of enzyme, the optimum condition for the production of enzyme by liquid state fermentation (LSF) in growen with: media contains starch + pullulan as a carbon source, peptone as a nitrogen source, inoculums size 2 ml, and incubated at 40 C° with pH 7 for 48 hrs. In addition pullulanase production by solid state fermentation (SSF) was investigated using isolated Bacillus licheniformis (Bs18). Optimization of process parameters were carried out ,the optimum solid substrate , Temperature , pH , incubation period , inoculation size , hydrat
... Show MoreThe variational iteration method is used to deal with linear and nonlinear differential equations. The main characteristics of the method lie in its flexibility and ability to accurately and easily solve nonlinear equations. In this work, a general framework is presented for a variational iteration method for the analytical treatment of partial differential equations in fluid mechanics. The Caputo sense is used to describe fractional derivatives. The time-fractional Kaup-Kupershmidt (KK) equation is investigated, as it is the solution of the system of partial differential equations via the Boussinesq-Burger equation. By comparing the results that are obtained by the variational iteration method with those obtained by the two-dim
... Show MoreIn this paper, a miniaturized 2 × 2 electro-optic plasmonic Mach– Zehnder switch (MZS) based on metal–polymer–silicon hybrid waveguide is presented. Adiabatic tapers are designed to couple the light between the plasmonic phase shifter, implemented in each of the MZS arms, and the 3-dB input/output directional couplers. For 6 µm-long hybrid plasmonic waveguide supported by JRD1 polymer (r33= 390 pm/V), a π-phase shift voltage of 2 V is obtained. The switch is designed for 1550 nm operation wavelength using COMSOL software and characterizes by 2.3 dB insertion loss, 9.9 fJ/bit power consumption, and 640 GHz operation bandwidth
As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put
... Show More