Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity of the sensor has a significant dependence on the thickness of the coating and the sensor with the highest sensitivity showed a linear response for RH change in the range of 27-95% RH and a fast response time of 0.8 sec for an RH change from 50% to 90%.
This studay was performd on 30 serum specimens of patients having type II diabetes with cardiac disease, and 40 normal specimens were investigated as control group.The activity rate of AAP in patients (125.31± 3.28)I.U/L and activity rate of AAP in normals (6.76±2.21) I.U/L, in addition purification of AAP from serum patients having type II diabetes with cardiac diaease by using dialysis bag and gel filtration (Sephadex G-50). The results of the study reveal that Alanine aminopeptidase (AAP) activity of type II diabetes with cardiac disease patients' serum show a high signifiacant increase (p<0.001) compare to normal subject .
This study investigates the impact of spatial resolution enhancement on supervised classification accuracy using Landsat 9 satellite imagery, achieved through pan-sharpening techniques leveraging Sentinel-2 data. Various methods were employed to synthesize a panchromatic (PAN) band from Sentinel-2 data, including dimension reduction algorithms and weighted averages based on correlation coefficients and standard deviation. Three pan-sharpening algorithms (Gram-Schmidt, Principal Components Analysis, Nearest Neighbour Diffusion) were employed, and their efficacy was assessed using seven fidelity criteria. Classification tasks were performed utilizing Support Vector Machine and Maximum Likelihood algorithms. Results reveal that specifi
... Show MoreBasic Orientation and search path in determining the impact of creative thinking in cultural intelligence field research on the doctors competence, as is a theme of creative thinking great importance in spite of being a old , but his role at the individual level and / or organizational a sustainable effect toward developing a fact uncommon , any sense that one of the pillars of modernity and provide a unique future, as is the competitive weapon of the organizations in an environment dubbed fundamental change and provide all that is unfamiliar, and in the center of the field of research and objective measurement of creative thinking on doctors specialists at the construction of a state of the preference and
... Show More
The nanocompsite of alumina (Al2O3) produced a number of beneficial effects in alloys. There is increasing in resistance of materials to surface related failures , such as the mechanical properties , fatigue and stress corrosion cracking .The experimental results observed that the adding of reinforced nanomaterials type Al2O3 enhanced the HB hardness, UTS, 0.2 YS and ductility of 2014 Al/Al2O3 nano composites . the analysis of experiments, indicated that The maximum enhancement was observed at 0.4 wt.% Al2O3. The ultimate improvement percentage were 15.78% HB hardness, 18.1% (UTS), 12.86% (
... Show MoreThe research aims to enrich the subject of marketing deception, which is still in the concept stage at the level of the research sample and to allow future researchers to contribute to addressing the concept of marketing deception and linking it with other variables. The research problem is that is there a correlation between marketing deception and organizational reputation in Baghdad assets. What is the reflection of marketing deception on the organizational reputation in the assets of Baghdad? The research is concerned with shedding light on the reputation of the organization in terms of frequency of purchase, place of purchase, brand loyalty, and knowing the impact of marketing deception on these fact
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More