Pulsed laser ablation in liquid (PLAL) technique can produce high purity nanoparticles, it is a top-down physical method based on the principle of dividing metal ion bulk precursors into metal atoms, this method was used in this work to synthesis cobalt nanoparticals (CoPNs) with the use of Nd: YAG laser with two wavelengths (355 nm) and (532 nm) at energies (500 mJ) and (600 mJ) respectively, with number of pulses (1000,1100, 1200, 1300, and 1400) for each wavelength. The properties of the prepared nanoparticles were studied by UV-Vis, XRD, SEM with EDX, AFM, and FTIR analysis and then its antibacterial activity was studied by applying it on two types of bacteria with gram-positive (Staphylococcus aureus, Streptococc
... Show MoreZnS:MnP2+P nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS:MnP 2+P quantum dots were zinc acetate as zinc source, thioacetamide as a sulfur source, manganese chloride as manganese source (R & M Chemical) and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS:MnP 2+P with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM) also by field effect scanning electron microscopy (FESEM). The composition of the samples is analysed by EDS. UV-Visible absorption spectroscopy analysis
... Show MorePoly aniline-formaldehyde/chitosan composite (PAFC) was prepared by the in situ polymerization method. It was characterized by FTIR spectroscopy in addition to SEM, EDS and TGA techniques. The adsorption kinetics of malachite green dye (MG) on (PAFC) were studied for various initial concentrations (20, 30 and 40) mg/L at three temperatures (308, 313 and 318) K. The influence factors of adsorption; adsorbent dose, contact time, initial concentration and temperature were investigated. The kinetic studies confirmed that adsorption of MG obeyed the pseudo-second-order model and the adsorption can be controlled through external mass transfer followed by intraparticle diffusion mass transfer. A study of th
Groundwater recharge estimation is essential for management of groundwater systems. As groundwater is a vital source of water for domestic and agricultural activities in the study area (Karbala - Najaf plateau), where the Dibdibba aquifer represents the primary and essential aquifer, evaluation of groundwater recharge is critical in the study area. A wide range of methodologies exists for estimating recharge. The water-table fluctuation method strategy might be the most generally utilized system for estimating recharge; it requires learning of changes in water levels over time and specific yield. Advantages of this approach include its simplicity and an insensitivity to the mechanism by which water moves through the unsatu
... Show MoreIn this study, the dynamic modeling and step input tracking control of single flexible link is studied. The Lagrange-assumed modes approach is applied to get the dynamic model of a planner single link manipulator. A Step input tracking controller is suggested by utilizing the hybrid controller approach to overcome the problem of vibration of tip position through motion which is a characteristic of the flexible link system. The first controller is a modified version of the proportional-derivative (PD) rigid controller to track the hub position while sliding mode (SM) control is used for vibration damping. Also, a second controller (a fuzzy logic based proportional-integral plus derivative (PI+D) control scheme) is developed for both vibra
... Show MoreAbstract
For sparse system identification,recent suggested algorithms are -norm Least Mean Square (
-LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named
-ZA-LMS,
The reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method and the Standard Bayes method with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform
... Show MoreIn this work , a hybrid scheme tor Arabic speech for the recognition
of the speaker verification is presented . The scheme is hybrid as utilizes the traditional digi tal signal processi ng and neural network . Kohonen neural network has been used as a recognizer tor speaker verification after extract spectral features from an acoustic signal by Fast Fourier Transformation Algorithm(FFT) .
The system was im plemented using a PENTIUM processor , I000
MHZ compatible and MS-dos 6.2 .
Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a
... Show MorePhishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency. This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing websi
... Show More