The performance of H2S sensor based on poly methyl methacrylate (PMMA)-CdS nanocomposite fabricated by spray pyrolysis technique has been reported. XRD pattern diffraction peaks of nano CdS has been indexed to the hexagonally wurtzite structured The nanocomposite exhibits semiconducting behavior with optical energy gap of4.06eV.SEM morphology appears almost tubes like with CdS/PMMA network. That means the addition of CdS to polymer increases the roughness in the film and provides high surface to volume ratio, which helps gas molecule to adsorb on these tubes. The resistance of PMMA-CdS nanocomposite showed a considerable change when exposed to H2S gas. Fast response time to detect H2S gas was achieved by using PMMA-CdS thin film sensor. The sensitivity, response and recovery time were calculated with different operating temperatures (50, 100, 150)°C. © 2017, National Institute R and D of Materials Physics. All rights reserved.
Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit
The x-ray fluorescence (XRF) of Znpc molecule with (flow of Ar) and Znpc molecule with (grow in N2) showed two peaks at (8.5and 9.5 Kv) referring to orbital transition ) K?-shell & K?-shell) respectively. The study of x-ray diffraction (XRD) where it was observed good growth of the crystal structure as a needle by the sublimation technique with a ?-phase of (monoclinic structure ) . Using Bragg equation the value of the interdistance of the crystalline plane (d-value) were calculated. We noticed good similarity with like once in the American Standards for Testing Material (ASTM) .Powder Diffraction File (PDF) Program was used to ensure the information obtained from (ASTM) . The output of (PDF) was compared with celn program, where the val
... Show MoreOrganic permeable‐base transistors (OPBTs) show potential for high‐speed, flexible electronics. Scaling laws of OPBTs are discussed and it is shown that OPBT performance can be increased by reducing their effective device area. Comparing the performance of optimized OPBTs with state‐of‐the‐art organic field‐effect transistors (OFETs), it is shown that OPBTs have a higher potential for an increased transit frequency. Not only do OPBTs reach higher transconductance values without the need for sophisticated structuring techniques, but they are also less sensitive to parasitic contact resistances. With the help of a 2D numerical model, the reduced contact resistances of OPBTs are explained by a homogeneous injection of current acros
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5