PPSU hollow fiber nanofiltration membranes are prepared by applying two concentrations and various extrusion pressures according to the phase inversion method. Cross-sectional area and outer structures were characterized by using scanning electron microscope (SEM) and atomic force microscopy (AFM). In additional to the pore size distribution, either the mean roughness or the mean pore size of the PPSU hollow fiber surfaces was evaluated by AFM. It was found that the morphology of the PPSU fibers had both sponge-like and finger-like structures through different extrusion pressures and PPSU concentrations. The mean pore size and mean roughness for inner and outer surfaces were seen to be decreased with the increase of extrusion pressure at
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are greatly used
for sensing applications. This work presents the fabrication and
characterization of a relative humidity sensor based on Mach-
Zehnder Interferometer (MZI), which operates in reflection mode.
The humidity sensor operation based on the adsorption and
desorption of water vapour at the silica-air interface within the PCF.
The fabrication of this sensor is simple, it only includes splicing and
cleaving the PCF with SMF.PCF (LMA-10) with a certain length
spliced to SMF (Corning-28).
The spectrum of PCFI exhibits good sensitivity to humidity
variations. The PCFI response is observed for a range of humidity
values from (27% RH to 85% RH), the positi
Copper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreBackground: The mechanical properties of 3D-printed denture base resins are crucial factors for determining the quality and performance of dentures inside a patient’s mouth. Tensile strength and diametral compressive strength are two properties that could play significant roles in assessing the suitability of a material. Although they measure different aspects of material behavior, a conceptual link exists between them in terms of overall material strength and resilience. Aim: This study aims to investigate the correlation between tensile strength and diametral compressive strength after incorporating 2% ZrO2 nanoparticles (NPs) by weight into 3D-printed denture base resin. Methods: A total of 40 specimens (20 dumbbell-shaped and
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show More