Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 445mJ pulse energy has been used to induce the acoustic wave signal in these targets. The acoustic signal is then filtered and analyzed to construct the target image. The analysis of experimental data and image construction has been accomplished using matlab software. The measurement analysis showed reasonable agreement between the estimated object dimension and the actual object size. The error in fish heart object dimension ranged from -14% to +9%, and the maximum error in Blood sac object dimension was -55%. The object dimensional error increased to -92% when the laser spot was magnified from 2mm to 45mm (to cover the phantom area) as the energy density decreases significantly.
Research summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Ag nanoparticles were prepared using Nd:YAG laser from Ag matel in distilled water using different energies laser (100 and 600) mJ using 200 pulses, and study the effect of the preparation conditions on the structural characteristics of and then study the effect of nanoparticles on the rate of killing the two types of bacteria particles (Staph and E.coli). The goal is to prepare the nanoparticle effectively used to kill bacteria.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreOrthogonal Frequency Division Multiplexing (OFDM) is one of recent years multicarrier modulation used in order to combat the Inter Symbol Interference (ISI) introduced by frequency selective mobile radio channel. The circular extension of the data symbol, commonly referred to as cyclic prefix is one of the key elements in an OFDM transmission scheme. This paper study The influence of the cyclic prefix duration on the BER performance of an OFDM-VCPL (Orthogonal frequency division multiplexing - Variable Cyclic Prefix Length) system and the conventional OFDM system with frame 64-QAM modulation is evaluated by means of computer simulation in a multipath fading channel. The adaptation of CP is done with respect to the delay spread estimation
... Show MoreMany problems are facing the installation of piles group in laboratory testing and the errors in results of load and settlement are measured experimentally may be happened due to select inadequate method of installation of piles group. There are three main methods of installation in-flight, pre-jacking and hammering methods. In order to find the correction factor between these methods the laboratory model tests were conducted on small-scale models. The parameters studied were the methods of installation (in-flight, pre-jacking and hammering method), the number of piles and in sandy soil in loose state. The results of experimental work show that the increase in the number of piles value led to increase in load carrying ca
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreB3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show More