Consecutive charging and discharging of a PCM-based plate heat exchanger with zigzag configuration
...Show More Authors
Background: For decades, the use of naturally accessible materials in treating human disease has been widespread. The goal of this study was to determine the anti-fungal effectiveness /of the lemongrass essential oil (LGEO) versus Candida albicans (C. albicans) adhesion to polymethylmethacrylate (PMMA) materials. Material and methods: LGEO's anti-fungal activity was tested against C. albicans adhesion using the following concentration of LGEO in PMMA monomer (2.5 vol. %, 5 vol. % LGEO) selected from the pilot study as the best two effective concentrations. A total of 40 specimens were fabricated for the candida adherence test and were subdivided into four equal groups: negative control 0 vol. % addition, experimental with 2.5 vol. % and
... Show MoreThis study was design to investigate the dimensional stability of heat-activated acrylic resin with different methods of flask cooling (15 minutes rapid cooling, one hour bench cooling, four hours delayed deflasking, and 24 hours delayed deflasking) at different time intervals (immediately, two days, seven days, 30 days) after deflasking. Heat-activated acrylic resin was used to prepare acrylic samples. Then, measurement of the distances where achieved between the centers of selected marks in the acrylic samples. They were measured at different time intervals for different methods of flask cooling. The results showed that the group samples of the four hours and 24 hours of delayed deflasking was insignificantly different from the control an
... Show MoreBackground: This study aimed to evaluate the effect addition of polyester fibers on the some mechanical properties of heat cured acrylic resin (implant strength, flexural strength and hardness) Materials and methods: Ninety specimens were used in the study. Thirty specimens were used for impact strength measurements (80mm X 10mm X 4mm) length, width and thickness respectively. The specimens divided into three test groups (n=10), first group formed from heat cure acrylic resin without fiber reinforcement. Second group was formed from heat cure acrylic resin was reinforced with 2 mm length polyester fiber and third group was formed from heat cure acrylic resin reinforced with 4mm length polyester fiber, impact strength measured by impact test
... Show MoreIn this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe
... Show MoreOn the basis of known coumarin-based prodrug system, a novel coumarin-based mutual prodrug of 5-fluorouracil and dichloroacetic acid was designed, synthesized and evaluated as a promising oral chemotherapeutic agent basing on in vitro stability study in HCl buffer (pH 1.2) and in phosphate buffer (pH 7.4), as well as in vitro release study in human serum. The chemical structure of prodrug was confirmed by analyzing its FTIR, 1H NMR, 13C NMR and MS-ESI spectra. The results of in vitro kinetic study indicated that the prodrug was significantly stable in HCl and in phosphate buffers, and was hydrolyzed in human serum followed pseudo first order kinetics.
Keywords: Coumarin-bas
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More