A simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μm and the length with 2 cm.
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA progression of Polyaniline (PANI) and Titanium dioxide (TiO2) nanoparticles (NPs) were prepared by an in-situ polymerization strategy within the sight of TiO2 NPs. The subsequent nanocomposites were analyzed using Fourier-transform infrared spectra (FTIR), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), and Energy Dispersive X-Ray Analysis (EDX) taken for the prepared samples. PANI/TiO2 nanocomposites were prepared by various compound materials (with H2SO4 0.3 M and without it, to compare the outcome of it) by the compound oxidation technique using ammonium persulfate (APS) as oxidant within the sight of ultrafine grade powder of TiO2 cooled in an ice bath.
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
This study aimed to investigate the effect of oral administration of pomegranate seed oil on diabetic in male rabbits. A total of 32 adult male rabbits.6 months old weighting 1-2kg were divided in to four equal groups. G- Control (negative) Rabbits were received olive oil, G2- (control positive) Rabbits were received (30 mg/kg B.W/daily of the Pomegranate seed oil orally and daily for 45 day. G3-Rabbits were received (150mg/kg of Alloxan injected Intraperitonealy, G4-Rabbits were received the same dose orally of the Pomegranate seed oil four 45 days. There is significant increase (Insulin, Insulin resistance) and decreased glucose in group received Pomegranate seed oil (G4) as compared with G3 (diabetic group). On conclusion, the administra
... Show MoreDate palm fiber is one of the common wastes available in the M. E. countries essentially Iraq. The aim of search to investigate the performance and effects of fiber date palm on the mechanical properties of high strength concrete, this fiber was used in three ratio 2, 4 and 6 % by vol. of concrete at ages of (7, 28, 90) days. Results demonstrated improvement in the compressive strength increased 19.2 %, 23.6%, 24.9 % for 2%, 4%, 6% of fiber respectively at age 28 days. Flexural strength increases 47.6%, 66.2%, 93.8% form (2,4,6) % of fiber respectively at age 28 days. Density increase about 0.41%, 0, 61 % 0.69 % for (2,4,6) % of fiber respectively at age 28. Absorption water decrease
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More