NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensing device was used to evaluate the fabrication network toward NH3 gas at ppm levels as well as the response to sensitivity by changing the concentration. MWCNTs-OH network of 8mm thickness showed an increase in resistance upon exposure to the NH3 gas. The sensor exhibits a good sensitivity for low concentration of NH3 gas at room temperature. The sensitivities of the network were 2.5% at 14ppm, 5.3% at 27ppm and 17.6% at 68ppm. Further investigations showed that the network was specific sensitive to NH3 gas in the environment and not affected by the amount of ambient air.
Objective(s): This study aims to evaluate the hardness of two commercially available cold cured acrylic resin material
(Vertex and PAN) when polymerized at different temperature in comparison to those polymerized by conventional
methods in air at 23C ± 5C.
Methodology: Eighty specimens, forty from cold cured acrylic (Vertex Type) and forty from cold cured acrylic (PAN
type) were prepared, flasking and packing procedure were done according to manufacturer direction and divided
according to processing as follow: 20 specimens (10 from Vertex type and 10 from PAN type) were processed in air for
two hours at 23C ± 5C under press (bench curing) as a control, and 60 specimens (30 from Vertex type and 30 from
PAN type) wer
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Reading is one of the essential components of the English language. Countries that use English as a second language (ESL) sometimes have difficulties in reading and comprehension. According to many researches, mother tongue has proved some interferences with learning a second language. This study investigated the results of reading difficulties of young second language learners in terms of accuracy, comprehension, and rate using the Neale Analysis of Reading Ability test. The study was carried out in one of the High Schools for Boys in Hyderabad, India and included Grade five, aged 10-12 years. In order to understand the reading difficulties of English as a second language, a qualitative approach was employed. Interview, reading tes
... Show MoreWater supply networks are marred by serious risks of imperceptible pipeline leakage, posing sustainability and performance threats. This article highlights the use of vibratory signal features to get around the drawbacks of traditional methods in a highly detailed framework for leak detection based on CatBoost. demonstrated excellent diagnostic performance and carried out a thorough test performance evaluation on five leakage configurations . The expected system achieved an accuracy of 98.1% (variance (well within x/3% of expected):, beating traditional competitors such as Random Forest (97.3%) and Support Vector Machine (93.8%). For example, the area under the receiver-operating characteristic curve was 0.995, in
... Show MoreThe two-dimensional transient heat conduction through a thermal insulation of temperature dependent thermal properties is investigated numerically using the FVM. It is assumed that this insulating material is initially at a uniform temperature. Then, it is suddenly subjected at its inner surface with a step change in temperature and subjected at its outer surface with a natural convection boundary condition associated with a periodic change in ambient temperature and heat flux of solar radiation. Two thermal insulation materials were selected. The fully implicit time scheme is selected to represent the time discretization. The arithmetic mean thermal conductivity is chosen to be the value of the approximated thermal conductivity at the i
... Show Moreact : A soluble cytoplasmic antigen (Brucellin) was prepared from Brucella melitensis Rev1 and used to diagnose brucellosis in experimentally infected mice with virulent strains of Brucella melitensis and Brucella abortus two weeks after infection. The best result was obtained with the third peak of the four peaks. All four peaks were used as antigen for skin test in a group of mice two weeks after vaccinated with S19 vaccine and the best result was obtained with third peak. All four peaks were also used as antigen for skin test in a group of mice previously vaccinated with Listeria monocytogenes live attenuated vaccine. All four fractions of the extracted brucellin antigens exhibited a negative skin test result in Listeria monocytogenes ex
... Show MoreMany authors investigated the problem of the early visibility of the new crescent moon after the conjunction and proposed many criteria addressing this issue in the literature. This article presented a proposed criterion for early crescent moon sighting based on a deep-learned pattern recognizer artificial neural network (ANN) performance. Moon sight datasets were collected from various sources and used to learn the ANN. The new criterion relied on the crescent width and the arc of vision from the edge of the crescent bright limb. The result of that criterion was a control value indicating the moon's visibility condition, which separated the datasets into four regions: invisible, telescope only, probably visible, and certai
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show More