A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreRe-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c
This work deals with preparation of zeolite 5A from Dewekhala kaolin clay in Al-Anbar region for drying and desulphurization of liquefied petroleum gas. The preparation of zeolite 5A includes treating kaolin clay with dilute hydrochloric acid 1N, treating metakaolin with NaOH solution to prepare 4A zeolite, ion exchange, and formation. For preparation of zeolite 4A, metakaolin treated at different temperatures (40, 60, 80, 90, and 100 °C) with different concentrations of sodium hydroxide solution (1, 2, 3, and 4 N) for 2 hours. The zeolite samples give the best relative crystallinity of zeolite prepared at 80 °C with NaOH concentration 3N (199%), and at 90 and 100°C with NaOH concentration solution 2N (184% and 189%, respectively). Ze
... Show MoreRetained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More