A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors
In this work, a fiber-optic biomedical sensor was manufactured to detect hemoglobin percentages in the blood. SPR-based coreless optical fibers were developed and implemented using single and multiple optical fibers. It was also used to calculate refractive indices and concentrations of hemoglobin in blood samples. An optical fiber, with a thickness of 40 nanometers, was deposited on gold metal for the sensing area to increase the sensitivity of the sensor. The optical fiber used in this work has a diameter of 125μm, no core, and is made up of a pure silica glass rod and an acrylate coating. The length of the fiber was 4cm removed buffer and the splicing process was done. It is found in practice that when the sensitive refractive i
... Show MoreThis study evaluates the performance of magnetic abrasive finishing (MAF) of aluminum alloy in terms of achieving materials removal (MR). A vertical milling machine is used to perform the finishing process using a developed MAF unit that consists of an inductor made out of a 150 mm long and 20 mm diameter iron core wound with 1500 turns and 0.5 mm copper wire. The commutator and magnetic pole are attached at the top and bottom of the inductor, respectively. The required current is supplied using a DC power supply. The South Pole workpiece is a 100×50×3 mm3 plate of AA 1100 aluminum alloy, whereas the magnetic pole represented the North Pole. Pole rotational speed, applied current, and abrasive finishing time was selected as
... Show MoreBecause of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a
Waveform transport of Pseudo plastic fluid in complaint symmetric channel with culvature properties has designed. The efforts of magnetic force, which has applied by radiate direction in the analysis, is considered by using the influence of Hartmann number. Walls properties with slip conditions on velocity distribution as well as stream function are used. The analysis of" heat and mass transfer" has taken into account. More popularized factual constraints known by the convective conditions are applied. The partial differential equations of motion, temperature and concentration is reduced under the simulation of low quantity of wave number and Reynolds number and then transformed to or
Background: Temporomandibular joint disorder (TMD) is a general term that describe a wide variety of conditions that include myogenic pain, internalderangement, arthritic problem, ankylosis of the joint and growth disorders. The aims of study was to evaluate the value of 3 Tesla magnetic resonance imaging in assessment of articular disc position and configuration in patients with temporomandibular joint disorders and to evaluate the correlations of these MRI findings with the clinical signs and symptoms. Materials and methods: A total forty six (30 study and 16 control) participants aged between18 and 49 years, were examined according to Helkimo anamnestic index (questionnaire for anamnesis) and clinical dysfunction index scoring criteria
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreBackground: Prolapsed intervertebral disc is an important and common cause of low backache. MRI has now become universally accepted investigation for prolapsed intervertebral disc. We, however, regularly come across situations, when MRI shows diffuse disc bulges, even at multiple levels, which cannot be correlated clinically and when such cases are operated, no significant disc prolapse is found resulting in negative exploration. Objective: To evaluate the role of M.R.I. finding not only for diagnosis of disc herniation at lumbar region but also for localization the level of herniation Methods: A prospective study on seventy five symptomatic low backache and MRI confirmed prolapsed intervertebral disc patients at lumbo-sacral region were op
... Show More