A simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μm and the length with 2 cm.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreThe drive of this exploration is to investigate the mucoadhesive assets of A. indica (Azadirachta indica) fruit mucilage by incorporating it into mucoadhesive microspheres with Acyclovir (AVR) as a model drug. The study was performed to check the impact of the mucilage proportion on particle size and swelling index. Nine batches of AVR mucoadhesive microspheres were made with varying proportions of Polyacrylic acid 934P and A. indica fruit mucilage (AIFM). A central composite design with design expert software to check the impact of dependent variables (A. indica mucilage and Polyacrylic acid 934 P levels) on particle size and swelling index as a response. As part of congeniality studies, the batches w
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreAbstract: The development of highly sensitive sensors has become an efficient field of research. In this work, an ArF Excimer laser of 193 nm with a maximum pulse energy of 275 mJ, 15 ns pulse duration and a repetition rate of 1 Hz is utilized to form a Laser Induced Periodic Surface Structures (LIPSS) of three different morphologies (nanochains, contours, grooves) on surface of CR39 polymer at a fluence range above the ablation threshold (250 mJ/cm2). The laser ablated polymer surface is then Surface Enhanced Raman Scattering (SERS) activated by deposition of a gold layer of 30 nm thickness. The capability of the produced substrate for surface enhanced Raman scattering is evaluated through thiophenol as an analyte molecule. It is observ
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreNowadays, the ideas of integrating the concepts of the environment and saving it are being famous. These ideas are widely seen in many fields of study, and language education is one of them. Thus, the identity of English Language teachers (ELT) is a step toward transferring this concept in EFL materials in ELT departments. The EFL teacher's identity takes different meanings. Sometimes, it only means the teacher who teaches the English language, and other times, it means, the cultural and social aspects that the teacher and students interact during the study course. These cultural and social aspects represent the environment in teacher’s identity. This study aims to explore the environmental identity within EFL teacher identity. The sam
... Show MoreAfter the spread of the function of the scenographer in the modern theater, his vision has become present in most of the theatrical works and because the director is the master of the work and the owner of the vision that appears in front of the audience, the overlap between the visions of each of them was required. This research is an attempt to detect the overlap and disengagement in the work of each of them.
The research is divided into a methodological framework that included the research problem, importance, limits, and purpose, and then the definition of terms. In the theoretical framework, the research dealt with two theoretical sections that pave the way for raising ideas related to this subject: the first section (scenography
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More