In this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the structural characteristics on the resonant spectra are also researched in order to improve sensing performance. The greatest amplitude sensitivity was 99.2 RIU-1 and maximum resolution was 4 x 10-5 RIU achieved within the detection range (1.351-1.363).
In this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis. Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreTin oxide films (SnO2) of thickness (1 ?m) are prepared on glass substrate by post oxidation of metal films technique. Films were irradiated with Nd:YAG double frequency laser of wavelength (532 nm) pulses of three energies (100, 500, 1000) mJ. The optical absorption, transmission, reflectance, refractive index and optical conductivity of these films are investigated in the UV-Vis region (200-900) nm. It was found that the average transmittance of the films is around (80%) at wavelength (550 nm) and showed high transmission (? 90 %) in the visible and near infrared region. The absorption edge shifts towards higher energies, which is due to the Moss-Burstien effect and it lies at (4 eV). The optical band gap increased with increasing of ene
... Show MoreBackground: This study evaluated the influence of different fiber formulations incorporation in resin composite on cuspal deflection (CD) of endodontically-treated teeth with mesio-occluso-distal (MOD) cavities. Materials and Methods: Thirty-two freshly extracted maxillary premolar teeth received MOD cavity preparation followed by endodontic treatment using single cone obturation technique, and divided into: Group I: direct composite resin only using a centripetal technique, Group II: direct composite resin with short fiber-reinforced composite (everX Flow), Group III: direct composite resin with leno wave ultra-high molecular weight polyethylene (LWUHMWPE) fibers placed on the cavity floor, and Group IV: direct composite resin with LWUHMWP
... Show MorePulsed laser deposition (PLD) technique was applied to prepared Chromium oxide (Cr2O3) nanostructure doped with Titanium oxide (TiO2) thin films at different concentration ratios 3,5,7 and 9 wt % of TiO2. The effect of TiO2 dopant on the average size of crystallite of the synthesized nanostructures was examined by X-ray diffraction. The morphological properties were discussed using atomic force microscopy(AFM). Observed optical band gap value ranged from 2.68 eV to 2.55 eV by ultraviolet visible(UV-Vis.) absorption spectroscopy with longer wave length shifted in comparison with that of the bulk Cr2O3 ~3eV. This indicated that the synthesized samples a
... Show MoreMultiple single-nucleotide polymorphisms (SNPs) located in the intergenic region between estrogen receptor 1 and
To assess the potential association between rs3757318 SNP and breast cancer pathogenicity, specifically in relation to serum vitam
Calculating the Inverse Kinematic (IK) equations is a complex problem due to the nonlinearity of these equations. Choosing the end effector orientation affects the reach of the target location. The Forward Kinematics (FK) of Humanoid Robotic Legs (HRL) is determined by using DenavitHartenberg (DH) method. The HRL has two legs with five Degrees of Freedom (DoF) each. The paper proposes using a Particle Swarm Optimization (PSO) algorithm to optimize the best orientation angle of the end effector of HRL. The selected orientation angle is used to solve the IK equations to reach the target location with minimum error. The performance of the proposed method is measured by six scenarios with different simulated positions of the legs. The proposed
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreFeatures is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.