This paper is intended to focus on the existing relation between 'logic' and 'meaning', and how 'meaning' is looked at through logical perspective. Besides, this paper adopts simple logical symbols to represent some aspects of meaning.
Since meaning is still regarded as a thorny area that needs further study to determine its nature and borderline, this paper proposes to resort to logic and logical rules. This paper points out how logical rules are used and how they clarify some oblique sentences. The paper also sheds light on how meaningful sentences are logically symbolized and how logic can define the borderline of meaning in an adequate manner. This paper hypothesizes that logic, l
... Show MoreThe purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreAn agricultural waste (walnut shell) was undertaken to remove Cu(II) from aqueous solutions in batch and continuous fluidized bed processes. Walnut shell was found to be effective in batch reaching 75.55% at 20 and 200 rpm, when pH of the solution adjusted to 7. The equilibrium was achieved after 6 h of contacting time. The maximum uptake was 11.94mg/g. The isotherm models indicated that the highest determination coefficient belongs to Langmuir model. Cu (II) uptake process in kinetic rate model followed the pseudo-second-order with determination coefficient of 0.9972. More than 95% of the Cu(II) were adsorbed on the walnut shells within 6 h at optimum agitation speed of 800 rpm. The main functional groups responsible for biosorption of
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching
... Show More