Cracking of soils affects their geotechnical properties and behavior such as soil strength and stability. In this paper, 2D Electrical Resistivity Imaging Method, as a non-invasive technique, was adopted to investigate the effect of soil cracks of a centemetric scale on resistivity of sandy soil. The electrical resistivity measurements were carried out using ABEM SAS 300C Terrameter system at a laboratory scale using Wenner array. The measurements were interpreted using horizontal profiles, forward modeling and 2D inverse resistivity sections. The results showed that soil cracks cause significant changes in soil resistivity. These changes can be attributed to the high resistivity contrast between the highly resistive air-filled cracks and the surrounding intact soil. The results indicate the visibility of the method to detect cracking of soils which is of high importance in the geological and geotechnical investigations.
In this study tungsten oxide and graphene oxide (GO-WO2.89) were successfully combined using the ultra-sonication method and embedded with polyphenylsulfone (PPSU) to prepare novel low-fouling membranes for ultrafiltration applications. The properties of the modified membranes and performance were investigated using Fourier-transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), contact angle (CA), water permeation flux, and bovine serum albumin (BSA) rejection. It was found that the modified PPSU membrane fabricated from 0.1 wt.% of GO-WO2.89 possessed the best characteristics, with a 40.82° contact angle and 92.94% porosity. The permeation flux of the best membrane was the highest. The pure water permeation f
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreFuzzy C-means (FCM) is a clustering method used for collecting similar data elements within the group according to specific measurements. Tabu is a heuristic algorithm. In this paper, Probabilistic Tabu Search for FCM implemented to find a global clustering based on the minimum value of the Fuzzy objective function. The experiments designed for different networks, and cluster’s number the results show the best performance based on the comparison that is done between the values of the objective function in the case of using standard FCM and Tabu-FCM, for the average of ten runs.
In this paper, we give new results and proofs that include the notion of norm attainment set of bounded linear operators on a smooth Banach spaces and using these results to characterize a bounded linear operators on smooth Banach spaces that preserve of approximate - -orthogonality. Noting that this work takes brief sidetrack in terms of approximate - -orthogonality relations characterizations of a smooth Banach spaces.
In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreBackground: The disc prolapse is a common condition especially in young adults. Different levels are affected in the lumber region; the L4/L5 disc is more susceptible to longitudinal load and is the most common site of lumbar disc prolapse. The L5/S1 disc is protected from torsion load by strong ilio-lumbar ligaments but it is more susceptible to axial compressive forces. Many factors affect the result and outcome of surgery in these levels.Objective: The aim of this study is to correlate operative data, short-term results, complications, and prognostic factors (age, gender, mobility, hospital stay, and level of pain) for one-level lumber discectomybetween different levels (L4–L5 vs. L5–S1).Methods In this prospective study, 32 patie
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f