In this work, a chemical optical fiber sensor based on Surface Plasmon Resonance (SPR) was designed and implemented using plastic optical fiber. The sensor is used for estimating refractive indices and concentrations of various chemical materials (methanol, distilled water, ethanol, kerosene) as well as for evaluating the performance parameters such as sensitivity, signal to noise ratio, resolution and the figure of merit of the fabricated sensor. It was found that the value of the sensitivity of the optical fiber-based SPR sensor, with 40 nm thick and 10 mm long Au metal film of exposed sensing region, was 3μm/RIU, while the SNR was 0.24, the figure of merit was 20, and the resolution was 0.00066. The sort of optical fiber utilized in this work is plastic optical fiber with a core diameter of 980 μm, a fluorinated polymer cladding of 20μm and a numerical aperture of 0.51.
Background: Denture cleansing was an important step that could prevent the spread of infection and improve a patient's health, the durability of the dentures, and the overall quality of life; therefore, it was necessary to choose a suitable cleanser that, in addition to being effective, did not have an unfavorable effect on the qualities of the denture base resin itself when used for an extended period. For this purpose, this study aimed to evaluate the effect of tea tree oil (TTO) on Candida albicans adhesion and the surface roughness property of poly(methyl methacrylate) denture material after immersion in TTO. Methods: A total of 55 heat-cured acrylic resin specimens were used for C. albicans adherence and surface roughness tests. The
... Show MoreCerium oxide CeO2, or ceria, has gained increasing interest owing to its excellent catalytic applications. Under the framework of density functional theory (DFT), this contribution demonstrates the effect that introducing the element nickel (Ni) into the ceria lattice has on its electronic, structural, and optical characteristics. Electronic density of states (DOSs) analysis shows that Ni integration leads to a shrinkage of Ce 4f states and improvement of Ni 3d states in the bottom of the conduction band. Furthermore, the calculated optical absorption spectra of an Ni-doped CeO2 system shifts towards longer visible light and infrared regions. Results indicate that Ni-doping a CeO2 system would result in a decrease of the band gap. Finally,
... Show MoreCerium oxide (CeO2), or ceria, has gained increasing interest owing to its excellent catalytic applications. Under the framework of density functional theory (DFT), this contribution demonstrates the eect that introducing the element nickel (Ni) into the ceria lattice has on its electronic, structural, and optical characteristics. Electronic density of states (DOSs) analysis shows that Ni integration leads to a shrinkage of Ce 4f states and improvement of Ni 3d states in the bottom of the conduction band. Furthermore, the calculated optical absorption spectra of an Ni-doped CeO2 system shifts towards longer visible light and infrared regions. Results indicate that Ni-doping a CeO2 system would result in a decrease of the band gap. Finally,
... Show MoreShort Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreSocial media and news agencies are major sources for tracking news and events. With these sources' massive amounts of data, it is easy to spread false or misleading information. Given the great dangers of fake news to societies, previous studies have given great attention to detecting it and limiting its impact. As such, this work aims to use modern deep learning techniques to detect Arabic fake news. In the proposed system, the attention model is adapted with bidirectional long-short-term memory (Bi-LSTM) to identify the most informative words in the sentence. Then, a multi-layer perceptron (MLP) is applied to classify news articles as fake or real. The experiments are conducted on a newly launched Arabic dataset called the Ara
... Show MoreIn this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More