This paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThis study including synthesis of some new Schiff bases compounds [1‐6] from the reaction of Sulfamethoxazole drug with some aromatic aldehydes in classical Schiff base method then treatment Schiff bases with succinic anhydride to get oxazepines rings [7-11]These derivatives were characterized by melting point, FT‐IR, 1H NMR and mass spectra. Some of synthesized compounds were evaluated in vitro for their antibacterial activities against three kinds of pathogenic strains Staphylococcus aureus, Escherichia coli
Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with
... Show MoreThe removal of fluoride ions from aqueous solution onto algal biomass as biosorbent in batch and continuous fluidized bed systems was studied. Batch system was used to study the effects of process parameters such as, pH (2-3.5), influent fluoride ions concentration (10- 50 mg/l), algal biomass dose (0–1.5 g/ 200 ml solution), to determine the best operating conditions. These conditions were pH=2.5, influent fluoride ions concentration= 10 mg/l, and algal biomass dose=3.5 mg/l. While, in continuous fluidized bed system, different operating conditions were used; flow rate (0.667- 0.800 l/min), bed depth (8-15 cm) corresponded to bed weight of (80- 150 g). The results show that the breakthrough time increases with the inc
... Show MoreBackground: Oral squamous cell carcinoma (OSCC) remains a lethal and deforming disease, with a significant mortality and a rising incidence in younger and female patients. It is thus imperative to identify potential risk factors for OSCC and oral PMDs and to design an accurate data collection tool to try to identify patients at high risk of OSCC development. 14 factors consistently found to be associated with the pathogenesis of OSCC and oral PMDs. Eight of themwere identified as high risk (including tobacco, alcohol, betel quid, marijuana, genetic factors, age, diet and immunodeficiency) and 6 low risk (such as oral health, socioeconomic status, HPV, candida infection, alcoholic mouth wash and diabetes) were stratified according to severit
... Show MoreThe present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show More