In this study, silica-graphene oxide nano–composites were prepared by sol-gel technique and deposited by spray pyrolysis method on glass substrate. The effect of changing the graphene/silica ratio on the optical properties and wetting of these nano–structures has been investigated. The structural and morphological properties of the thin films have been studied by x-ray diffraction spectroscopy (XRD), field emission scanning electron microscope (FESEM), energy dispersive x-ray spectroscopy (EDS) and atomic force microscope (AFM). XRD results show that silica structures present in the synthesized films exhibit amorphous character and there is a poor arrangement in graphene plates al
The research is conducted on target of investigating the role of growth strategy via diversification in value maximization of a firm in terms of controversies literatures had witnessed. Using a descriptive approach for analyzing and verifying the harmony of variables of research and their conceptualized logic , it could be reached to many conclusions agreed in their essence upon that the related diversification has the major role in value maximization of a firm and the wealth of its owners .
Titanium alloys are broadly used in the medical and aerospace sectors. However, they are categorized within the hard-to-machine alloys ascribed to their higher chemical reactivity and lower thermal conductivity. This aim of this research was to study the impact of the dry-end-milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. This research aims to study the impact of the dry-end milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. Also, it seeks to develop a new hybrid neural model based on the training back propagation neural network (BPNN) with swarm optimization-gravitation search hybrid algorithms (PSO-GS
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More