In this work, novel copolymers of poly(adipic anhydride-co-mannitol) were synthesized by melting condensation polymerization of poly(adipic anhydride) with five percentages of mannitol sugar, 1 to 5 Wt.%. These copolymers were purified and then, characterized by FT-IR, which was proved that the cross-linking reaction was caused by nucleophilic attack of mannitol hydroxyl group to acidic anhydride groups of poly(adipic anhydride) backbone and new ester groups were formed and appeared. Also, modified organic-soluble chitosan, N-maleoyl-chitosan, were synthesized by grafting reaction of chitosan with maleic anhydride in DMF as solvent, and it was also purified and characterized by FT-IR. Biodegradation in vitro of the IPNs of poly(adipic anhydride-co-mannitol)-N-maleoyl chitosan networks were evaluated by hydrolytic degradation studies at three different media (PBS, SIF and SGF) for 18 weeks with 92% as maximum degradation and it was found that minimum weight loss of IPNs was noticeably shown in SIF. In addition, hydrolytic degradation percent was decreased with increasing mannitol proportions.
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show Morethe use of diffrent concectration of Na and Mg ions were shown to causes in increase in the bindings at oncentration
This paper is summarized with one of the applications of adsorption behavior; A UV-Vis method has been applied to survey the isotherm of adsorption. Results for experimental showed the applicability of Langmuir equation. The effect of temperature on the adsorption of cobalt (II) Complex by bentonite surface was studied. The results shown that the amount of adsorption was formed to increase, such as the temperature increase (Endothermic process). Cobalt (II) Complex has adsorption studies by bentonite surface at different pH values (1.6-10); these studies displayed an increase in adsorption with increasing pH. ∆G, ∆H, and ∆S thermodynamic functions of the cobalt (II) Complex for their adsorption have been calculated
This paper is summarized with one of the applications of adsorption behavior; A UV-Vis method has been applied to survey the isotherm of adsorption. Results for experimental showed the applicability of Langmuir equation. The effect of temperature on the adsorption of cobalt (II) Complex by bentonite surface was studied. The results shown that the amount of adsorption was formed to increase, such as the temperature increase (Endothermic process). Cobalt (II) Complex has adsorption studies by bentonite surface at different pH values (1.6-10); these studies displayed an increase in adsorption with increasing pH. ΔG, ΔH, and ΔS thermodynamic functions of the cobalt (II) Complex for their adsorption have been calculated.
Erbium, as optical probe, doped silicate sol-gel glass with
different Er concentrations was formed by wet chemical synthesis
method using ethanol, water and tetraethaylorthosilicate
[Si(OC2H5)4] precursor. Erbium ions were incorporated into silica
sol-gel matrix via dissolution of Erbium chloride solution into the
initial Si(OC2H5)4 precursor sol. Aluminum (Al) as a co-dopant was
added to the final precursor in the form of Aluminum chloride
(AlCl3) solution. The prepared samples were analyzed using atomic
absorption analysis, X-ray diffraction and spectroscopic tests. The
experimental results concerned with the transmission spectra suggest
that the final samples have a good transparency and homogeneity.
A
Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific
... Show More