AlPO4 solid acid catalyst was prepared in order to use it in transesterification reaction of edible oil after supporting it with tungsten oxide. The maximum conversion of edible oil was obtained 78.78% at catalyst concentration (5gm.), temperature 70°Ϲ, 30/1 methanol/edible oil molar ratio, and time 5hr. The study of kinetics of the transesterification reaction of edible oil indicates that the reaction has an order of 3/2, while the value of activation energy for transesterification reaction is 51.367 kJ/mole and frequency factor equal 26219.13(L/ mol.minute).
Background: Consideration of mandibular third molar is important from orthodontic perspective due to several factors such as, lower anterior arch crowding, relapse in lower anterior region, interference with uprighting of mandibular first and second molars during anchorage preparation and molar distalization. The aims of this study were to assess of gender differences in the mandibular third molar position and compare and evaluate whether there is any differences in the results provided by CT scan and lateral reconstructed radiograph. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years. CT images for patients who were attending at Al Suwayra General Hospital/the C
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe bound radial wave functions of Cosh potential which are the solutions to the radial part of Schrodinger equation are solved numerically and used to compute the size radii; i.e., the root-mean square proton, neutron, charge and matter radii, ground density distributions and elastic electron scattering charge form factors for nitrogen isotopes 14,16,18,20,22N. The parameters of such potential for the isotopes under study have been opted so as to regenerate the experimental last single nucleon binding energies on Fermi's level and available experimental size radii as well.
In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreThe last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of
... Show MoreA theoretical study to design a conformal microstrip antennas was introduced in this work. Conformal microstrip antennas define antennas which can be conformed to a certain shape or to any curved surface. It is used in high-speed trains, aircraft, defense and navigation systems, landing gear and various communications systems, as well as in body wearable. Conformal antennas have some advantages such as a wider-angle coverage compared to flat antennas and low radar cross-sectional (RCS) and they are suitable for using in Radome. The main disadvantage of these antennas is the narrow bandwidth. The FDTD method is extremely useful in simulating complicated structures because it allows for direct integration of Maxwell's equations depending o
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show More