Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to provide successful results when inspecting composite coatings. Consequently, microwave NDT techniques have emerged to compensate for the shortcomings of traditional NDT approaches. Numerous microwave NDT methods have been reported for composite coatings inspection. Although existing microwave NDT methods have shown successful inspection of composite coatings, they often face several challenges, such as low spatial image quality and extensive data interpretation. Nevertheless, many of these limitations can be addressed by utilizing microwave NDT techniques with modern technologies such as soft computing. Artificially intelligent techniques have greatly enhanced the reliability and accuracy of microwave NDT techniques. This paper reviews various traditional NDT techniques and their limitations in inspecting composite coatings. In addition, the article includes a detailed review of several microwave NDT techniques and their benefits in evaluating composite coatings. The paper also highlights the advantages of using the recently reported microwave NDT approaches employing artificial intelligence approaches. This review demonstrates that microwave NDT techniques in conjunction with artificial intelligence approaches have excellent prospects for further enhancing composite coatings inspection and assessment efficiency. The review aimed to provide the reader with a comprehensive overview of most NDT techniques used for composite materials alongside their most salient features.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreObjectives: Six different Schiff bases were synthesized from ampicillin and amoxicillin with isatin, 5-bromoisatin, and 5-nitroisatin. Methods: Ampicillin and Amoxicillin are linked directly through their α-amino groups to the acyl side chain with isatin and isatin derivatives by nucleophilic addition using glacial acetic acid as a catalyst. Results: chemical structures of these Schiff bases were confirmed using FTIR, 1H NMR and elemental microanalysis. The antibacterial activity was evaluated by measuring minimum inhibitory concentration (MIC) values and showed various degrees of antibacterial activities when compared with parent drugs. Compounds 1a and 2b, which are the Schiff bases of ampicillin and amoxicillin with isatin, showed very
... Show MoreGreen synthesis of silver nanoparticles (AgNPs) using different plant parts has shown a great potential in medicinal and industrial applications. In this study, AgNPs were in vitro green synthesized using A. graecorum, and its antifungal and antitumoractivities were investigated. Scanning electron microscopy (SEM) image result indicated spherical shape of AgNPs with a size range of 22-36 nm indicated by using Image J program. The functional groups indicated by Fourier-transform infrared spectroscopy (FTIR) represented the groups involved in the reduction of silver ion into nanoparticles. Alhagi graecorum AgNPs inhibited MCF-7 breast cancer cell line growth in increased concentration depend manner, significant differences shown at
... Show MoreSo far synthesis of Gonadotropin Releasing Hormone (GnRH) analogues reported in the literature has clarified some aspects of structural activity of the naturally released GnRH. As a part of continuing efforts for further understanding of this relationship, the present investigation was undertaken which involved synthesis and biological evaluation of two GnRH analogues, firstly, by replacement of the amino acid L-Argenine in the 8th position at the backbone structure of the natural hormone by the amino acid D-Alanine; and secondly, by replacement of the amino acid L-Glycine in the 10th position by D-Alanine also at the backbone structure of the nature hormone, to obtain the following analogues respectively:
P
... Show MoreBackground: Pleural effusion is a common clinical
problem.
Objective: The aim of the study was to evaluate the
diagnostic utility of Carcino embryonic antigen
(CEA), CA 15- 3, and alpha-feto protein ( AFP ) as
a tumor markers in serum and pleural effusion and
evaluate the value of combining them as a diagnostic
tools that are complementary to cytology in the
diagnosis of malignancies .
Methods: Forty patients (18 malignant and 22 benign
pleural effusion) were included in this study .The
serum and effusion levels of CEA, CA 15 – 3 and
AFP were measured using immunoradiometric assay
Results: from the 40 effusions studied 26 were
exudates and 14 were transudates. The level of
pleural effusions
This study evaluated the functional response of the larva of the predator Chrysoperla carnea by offering varying densities of cabbage aphid, Brevicoryne brassicae (L.) . Results showed conformity with type–II functional response, where the number of prey killed approaches asymptote hyperbolically as prey density increases (declining proportion of prey killed or the inverse density dependent) till it reached the stability stage determined by handling time and predator satiation. Also, the values of attack rate and handling time changed with age progress for both predator and prey. It has been observed an increase in the attack rate and reduction in handling time with the progress of the predator age when feeding on a particular nymphal in
... Show MoreBackground: The ideal maxillofacial prosthesis should have fine and thin boundaries that bindwith the surrounding facial structures and possess high tear strength.This study aims to determinethe best percentages of nanofiller (TiO2) and intrinsic pigment (silicone functional intrinsic) thatcould be mixed in as additives to improve the tear strength of Cosmesil M511 andVST50F siliconeelastomers with the least effect on their hardness.Materials and Methods: In this in vitro experimental study, a total of 80 samples, 40 for eachelastomer, were fabricated. Each elastomer sample was split into two equal groups to test for tearstrength and Shore A hardness. Each group consisted of 20 samples, including 10 control sampleswithout additives and 10 e
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show More