A simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μm and the length with 2 cm.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreA progression of Polyaniline (PANI) and Titanium dioxide (TiO2) nanoparticles (NPs) were prepared by an in-situ polymerization strategy within the sight of TiO2 NPs. The subsequent nanocomposites were analyzed using Fourier-transform infrared spectra (FTIR), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), and Energy Dispersive X-Ray Analysis (EDX) taken for the prepared samples. PANI/TiO2 nanocomposites were prepared by various compound materials (with H2SO4 0.3 M and without it, to compare the outcome of it) by the compound oxidation technique using ammonium persulfate (APS) as oxidant within the sight of ultrafine grade powder of TiO2 cooled in an ice bath.
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreDate palm fiber is one of the common wastes available in the M. E. countries essentially Iraq. The aim of search to investigate the performance and effects of fiber date palm on the mechanical properties of high strength concrete, this fiber was used in three ratio 2, 4 and 6 % by vol. of concrete at ages of (7, 28, 90) days. Results demonstrated improvement in the compressive strength increased 19.2 %, 23.6%, 24.9 % for 2%, 4%, 6% of fiber respectively at age 28 days. Flexural strength increases 47.6%, 66.2%, 93.8% form (2,4,6) % of fiber respectively at age 28 days. Density increase about 0.41%, 0, 61 % 0.69 % for (2,4,6) % of fiber respectively at age 28. Absorption water decrease
The concept of social graphic design is one of the most critical areas that highlight the designer's knowledge of social responsibility by employing design skills in community awareness. This study focused on defining social graphic design, the meaning, practices, and strategies for designing awareness posters. This study reviewed two examples of awareness posters that reflect the Saudi designer's practices. The results summarized that social graphic design is a concept not taught directly but gained from permanent practice in designing awareness posters that interact with community issues. The designer's understanding of his social events and their sensing in the visual form of a poster reflects the designer's social awareness. Social g
... Show More