期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Comparative Analysis of Ti,Ni,and Au Electrodes on Characteristics of TiO_2 Nanofibers for Humidity Sensor Application 被引量:3
1
作者 S.S.Batool Z.Imran +6 位作者 M.Israr Qadir M.Usman H.Jamil M.A Rafiq m.m.hassan M.Willander 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2013年第5期411-414,共4页
The effect of metal (Ti, Ni, and Au) electrodes on humidity sensing properties of electrospun TiO2 nanofibers was investigated in this work. The devices were fabricated by evaporating metal contacts on SiO2 layer th... The effect of metal (Ti, Ni, and Au) electrodes on humidity sensing properties of electrospun TiO2 nanofibers was investigated in this work. The devices were fabricated by evaporating metal contacts on SiO2 layer thermally grown on silicon substrate. The separation between the electrodes was 90 μm for all sensors. The sensors were tested from 40% to 90% relative humidity (RH) by AC electrical characterization at room temperature. When sensors are switched between 40% and 90% RH, the corresponding response and recovery time are 3 s and 5 s for Ti-electrode sensor, 4 s and 7 s for Ni-electrode sensor, and 7 s and 13 s for Au-electrode sensor. The hysteresis was 3%, 5% and 15% for sensitivity of Ti, Ni, and Au-electrode sensors are Ti-, Ni-, and Au-electrode sensor, respectively. The 7.53 MΩ/%RH, 5.29 MΩ/%RH and 4.01 MΩ/%RH respectively at 100 Hz. Therefore Ti-electrode sensor is found to have linear response, fast response and recovery time and higher sensitivity as compared with those of Ni- and Au-electrode sensors. Comparison of humidity sensing properties of sensors with different electrode material may propose a compelling route for designing and optimizing humidity sensors. 展开更多
关键词 Titanium dioxide NANOFIBERS Metal electrodes Humidity sensor
原文传递
New Exact Solutions of Two Nonlinear Physical Models 被引量:1
2
作者 m.m.hassan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第4期596-604,共9页
Abundant new exact solutions of the Schamel-Korteweg-de Vries (S-KdV) equation and modified Zakharov- Kuznetsov equation arising in plasma and dust plasma are presented by using the extended mapping method and the a... Abundant new exact solutions of the Schamel-Korteweg-de Vries (S-KdV) equation and modified Zakharov- Kuznetsov equation arising in plasma and dust plasma are presented by using the extended mapping method and the availability of symbolic computation. These solutions include the Jacobi elliptic function solutions, hyperbolic function solutions, rational solutions, and periodic wave solutions. In the limiting cases, the solitary wave solutions are obtained and some known solutions are also recovered. 展开更多
关键词 modified Zakharov-Kuznetsov equation Schamel-Korteweg-de Vries equation traveling and periodic wave solutions extended mapping method
在线阅读 下载PDF
A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
3
作者 Wael Said Elsayed Mostafa +1 位作者 m.m.hassan Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第5期3193-3209,共17页
User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must e... User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment.The data stored on the public cloud will be vulnerable to outside and inside attacks.This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud.Different access control policies are applied for verifying users on the cloud.A security mechanism is applied to the cloud application that includes user registration,granting user privileges,and generating user authentication factor.An intrusion detection system is embedded to the security mechanism to detect malicious users.The multi factor authentication,intrusion detection,and access control techniques can be used for ensuring the identity of the user.Finally,encryption techniques are used for protecting the data from being disclosed.Experimental results are carried out to verify the accuracy and efficiency of the proposed frameworks and mechanism.The results recorded high detection rate with low false positive alarms. 展开更多
关键词 Cloud computing service providers multi-layer authentication frameworks and access control
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部