Three mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51, 167.25 , and 86.41 nm while the average pore diameter are 6.7, 16.4, and 2.7 nm for unfunctionalized, methyl, and phenyl functionalized silica respectively.
Deep learning (DL) plays a significant role in several tasks, especially classification and prediction. Classification tasks can be efficiently achieved via convolutional neural networks (CNN) with a huge dataset, while recurrent neural networks (RNN) can perform prediction tasks due to their ability to remember time series data. In this paper, three models have been proposed to certify the evaluation track for classification and prediction tasks associated with four datasets (two for each task). These models are CNN and RNN, which include two models (Long Short Term Memory (LSTM)) and GRU (Gated Recurrent Unit). Each model is employed to work consequently over the two mentioned tasks to draw a road map of deep learning mod
... Show MoreThermomechanical analysis (TMA) and differential scanning calorimetry (DSC) are used to investigate the effect of molding and annealing of polyester on the behavior of thermal expansion and crystallization since these factors play role in the reprocessing or recycling of the polymer. The dynamic mode of the TMA provides enhanced characterization information about the polyester since it separates the transitions into reversible and irreversible signals, and also reveals the progress of the amorphous regions as the polyester loses strength with the increasing temperature approaching melting. Slow cooling after annealing brings crystallization that may be attributed to molecular chain straightening due to orientation.
Global concerns are rising due to complications associated with the use of chemical agents and antibiotic resistance. Consequently, research focus has shifted towards the quest for effective agents of biological origin. The aim of the present study was to assess the antioxidant and antimicrobial potentials of aqueous and organic extracts derived from various parts of Alcea kurdica. Different parts of A. kurdica were obtained and prepared into leaf, flower and root powders. The powders were extracted with aqueous and organic solvents. The antimicrobial activity of these extracts was assessed against bacterial pathogens using the agar well-diffusion assay. Additionally, the antioxidant effects of the extracts were evaluated using the
... Show MoreThis paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More