Electrospun nanofiber membranes are employed in a variety of applications due to its unique features. the nanofibers' characterizations are effected by the polymer solution. The used solvent for dissolving the polymer powder is critical in preparing the precursor solution. In this paper, the Polyacrylonitrile (PAN)-based nanofibers were prepared in a concentration of 10 wt.% using various solvents (NMP, DMF, and DMSO). The surface morphology, porosity, and the mechanical strength of the three prepared 10 wt.% PAN-based nanofibers membranes (PAN/NMP, PAN/DMF, and PAN/DMSO) were characterized using the Scanning Electron Microscopy (SEM), Dry-wet Weights method, and Dynamic Mechanical Analyzer (DMA). Using DMF as a solvent resulted in a long, beaded, homogeneous, and smooth surface fibrous structure with an average diameter of 260 nm, which was the best among the solvents tested in this study in terms of porosity and mechanical strength.
The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show MoreA 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The to
... Show MoreStrategy Descrtibes How an Organization Matches its own Capabilites With Opportunities in Environment , in Order to Accomplish its Overall Objectives , So That The Organization is Considering Responding to Challenges by Adopting one or More of Strategies, Like Differentioning its Product, or Achieving Cost Leadership.
The Key Role of Management Accountant is to Evlaute The Successful it Has Been in Implementing Organization Strategy.
This Research Target to Explain The Key Role of Management Accountant in Evaluate of Organization Strategy. by Strategic Analysis of Operating Income From Specific Sources Such as Cost Savings and Growth in Stead of Emphasizing Only The Aggrega
... Show MoreBackground: Laser is a novel physical therapy technique used to treat various conditions, including wound healing, inhibition of bacterial growth, and postoperative wounds. High-power pulsed alexandrite laser therapy is one of the most prevalent forms of laser therapy, which is a noninvasive method for treating various pathological conditions, thereby enhancing functional capacities and quality of life. It is a modern medical and physiotherapeutic technology. Generally, the Alexandrite laser emits infrared light with a wavelength of 755 nm, allowing it to propagate and penetrate tissues. Objective: This study focused on the application of a high-power pulsed alexandrite laser in vitro to evaluate the effect of a pulsed alexandrite l
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More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
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
The objective of this study was to investigate the effect of Royal jelly RJ on morphology and motility of mice sperms. Sperms were collected from the cauda region of the epididymis of each 10 mice from the treatment and control groups. Direct activation techniques and evaluation of sperm morphology were carried out. Dhino microscope was used for sperm measurement. The inspection was carried out in Salamatic laboratory for pathological analysis in 2015.The result revealed that all of the sperm function parameters registered significant activation in the treatment group. There was a significant increase in both the percentage of the sperm motility grade A and the progressive motility (A+B) of the treatment gr
... Show More