
The technical of Flame Thermal Spray had been used in producing a cermet
composite based on powders of stabilized zirconium oxide containing amount of
Yatteria oxide (ZrO2- 8Y2O3) reiforced by minerals powders of bonding material
(Ni-Cr- Al- Y) in different rates of additions (25, 35, 50) on stainless steel base type
(304) after preparing it by the way of Grit Blasting.
Before heat treatment, the coated cermet layers were characterized for porosity
and electric resistivity. All samples were heat treated in vacuum furnace at different
temperature and times. The physical tests had been operated after heat treatment
and gave best results especially porosity, which found to be reduced dramatically
and producing hig
In this research study the effect of fish on the properties optical films thickness 1200-1800 and calculated energy gap Basra direct transport permitted and forbidden to membranes and urged decreasing values ??of Optical Energy Gap increase fish included accounts optical also calculate the constants visual as factories winding down and the refractive index and reflectivity membranes also by real part and imaginarythe dielectric constant
The tetradentate N2O2 Schiff base ligand, which is produced via the condensation reaction of 2-hydroxynaphthaldehyde with phthalohydrazide, is prepared in this work with a fair yield. The prepared ligand was characterized using a microanalysis technique (C.H.N), UV-vis, FTIR, 1H-,13C-NMR, mass spectrometry, and thermal gravimetric analysis (TGA). New complexes were synthesized by a reaction between ligand (N'1E,N'2Z)-N'1,N'2-bis((1-hydroxynaphthalen-2yl)methylene)phthalohydrazide and metal chloride of Co+2, Ni+2, and Zn+2 ions in absolute ethanol. The present complexes are also characterized by techniques such as C.H.N, UV-vis, FTIR, TGA, molar conductivity, atomic absorption, and magnetic moment measurements. The in vitro antimicro
... Show MoreAn Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreCancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More