Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected power and the position of the interference peaks is found to be shifted that the interference pattern with a 100 nm span can be observed with high humidity sensitivity of (8.49 pm / %RH) is achieved with compact (4mm) PCF length . The sensor has the advantages for suitable for monitoring humidity in microenvironments. The repeatability, long-term stability, measurement accuracy. Wide humidity range. The response time of the sensor is found to be 1.4 sec for a change in RH of 50 %RH. The fast response time suggests that the sensor can potentially be used as a human breath rate monitor in a clinical situation.
Background: There is plenty of evidence
suggesting that involvement of several groups of
viruses in the development and / or acceleration of
Type 1 Diabetes Mellitus (T1DM).
Objective: To analyze the T- cell proliferation in
the presence of Coxsackie virus B5 (CVB5), Polio
and Adenovirus antigens in addition to assessment
of Interferon- gamma (IFN-γ), Interleukins (IL-10
and IL-6).
Methods: In 60 Iraqi T1DM children with recent
onset of T1DM, Lymphocyte proliferation was
analyzed using Methylthiazol tetrazolium (MTT)
assay by culturing Peripheral Blood Lymphocytes
(PBLs) with Coxsackie Virus B5 (CVB5),
Adenovirus, and Polio vaccine. Serum Interferon-γ,
IL-10 and IL-6 were quantified by sandw
Background: Various studies conducted in many parts of the world suggest that there is lack of public awareness and knowledge of various aspects related to diabetes. With proper education, awareness, earlier detection and better care, many complications and co-morbidities can be reduced in diabetic population.Objectives: to evaluate the level of awareness of diabetes mellitus type 2 patients regarding their disease and its' complications.Methods: Cross – sectional survey was conducted during November and December 2011, in the Medical centers of Al Baladiat, Mustansyria and Zuafranya, including 145 type 2 diabetic patients (58.6 % males, 41.4% females) who were subjected to self–structured questionnaires regarding different aspects of
... Show MoreThe study of the validity and probability of failure in solids and structures is highly considered as one of the most incredibly-highlighted study fields in many science and engineering applications, the design analysts must therefore seek to investigate the points where the failing strains may be occurred, the probabilities of which these strains can cause the existing cracks to propagate through the fractured medium considered, and thereafter the solutions by which the analysts can adopt the approachable techniques to reduce/arrest these propagating cracks.In the present study a theoretical investigation upon simply-supported thin plates having surface cracks within their structure is to be accomplished, and the applied impact load to the
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreCloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe purpose of this paper is to apply styrene butadiene rubber (SBR) as virgin alongside expanded polystyrene (EPS) resin as a recycled polymer after consumption in the presence of bagasse fibers (BF) as biomass source derived from sugarcane in different concentrations to reinforce this polymeric matrix to form affordable composites that can be used in manufacturing low-cost and sustainable car interior-trim constituents.
SBR and EPS represent an example for thermoplastic elastomers (
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More