The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
It is often noted that disordered materials have different chemical properties to their more “ordered” cousins. Quantifying these effects in terms of thermodynamics is challenging in part because disordered materials can be difficult to characterize and are frequently relatively unstable. During the course of our experiments to understand the effects of disorder in catalysts for water oxidation we observed that many disordered manganese and cobalt oxide water oxidation catalysts directly oxidized peroxide in contrast to their more ordered analogues which catalyzed its disproportionation, that is, MnO2+2H+ +H2O2! Mn2+ +2H2O+O2(oxidation) versus H2O2!H2O+1=2 O2(disproportionation). By measuring the efficiency for one reaction over the oth
... Show MoreThis work aim to prepare Ag/R6G/PMMA nanocomposite thin
films by In-situ plasma polymerization and study the changes in the
optical properties of fluorophore due to the presence of Ag
nanoparticles structures in the vicinity of the R6G laser dye. The
concentrations of R6G dye/MMA used are: 10-4M solutions were
prepared by dissolving the required quantity of the R6G dye in
MMAMonomer. Then Silver nanoparticles with 50 average particles
size were mixed with MMAmonomer with concentration of 0.3, 0.5,
0.7wt% to get R6G silver/MMA in liquid phase. The films were
deposited on glass substrates by dielectric barrier discharge plasma
jet. The Ag/R6G/PMMA nanocomposite thin films were
characterization by UV-Visible
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreThe mechanism of the electronic flow rate at Al-TiO2 interfaces system has been studied using the postulate of electronic quantum theory. The different structural of two materials lead to suggestion the continuum energy level for Al metal and TiO2 semiconductor. The electronic flow rate at the Al-TiO2 complex has affected by transition energy, coupling strength and contact at the interface of two materials. The flow charge rate at Al-TiO2 is increased by increasing coupling strength and decreasing transition energy.
The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the d
... Show More