Preferred Language
Articles
/
9BeJbI4BVTCNdQwC9EcT
The use of Artificial Neural Network (ANN) for modeling of Cu (II) ion removal from aqueous solution by flotation and sorptive flotation process
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Adsorption and Thermodynamic Study of Direct Blue 71 Dye on to natural Flint Clay from Aqueous Solution
...Show More Authors

The remove of direct blue (DB71) anionic dye on flint clay in aqueous solution was investigated by using a batch system for various dye concentrations. The contact time, pH, adsorbent dose, and temperature was studied under batch adsorption technique. The data of adsorption equilibrium fit with isotherm Langmuar and Freiundlich ,when the correlation coefficient used to elucidate the best fitting isotherm model. The thermodynamic parameters such as, ?Hº ,?Sº and ?Gº. Thermodynamic analysis indicated that the sorption of the dyes onto Flint clay was endothermic and spontaneous.

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Calculating the Transport Density Index from Some of the Productivity Indicators for Railway Lines by Using Neural Networks
...Show More Authors

The efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of The Chilean Chemical Society
NEW AZO-SCHIFF BASE DERIVED WITH Ni(II), Co(II), Cu(II), Pd(II) AND Pt(II) COMPLEXES: PREPARATION, SPECTROSCOPIC INVESTIGATION, STRUCTURAL STUDIES AND BIOLOGICAL ACTIVITY
...Show More Authors

The coordination ability of the azo-Schiff base 2-[1,5-Dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethyl imino]-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylazo]-5- hydroxy-benzoic acid has been proven in complexation reactions with Co(II), Ni(II), Cu(II), Pd(II) and Pt(II) ions. The free ligand (LH) and its complexes were characterized using elemental analysis, determination of metal concentration, magnetic susceptibility, molar conductivity, FTIR, Uv-Vis, (1H, 13C) NMR spectra, mass spectra and thermal analysis (TGA). The results confirmed the coordination of the ligand through the nitrogen of the azomethine, Azo group (Azo) and the carboxylate ion with the metal ions. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and K are cal

... Show More
View Publication Preview PDF
Scopus (52)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Modeling of Bending Properties of Stainless Steel 304 Sheets Welded by Tungsten Inert Gas Welding Process
...Show More Authors

In this research, the effects of both current and argon gas pressure on the bending properties of welded joints were studied. Using the possible ranges of welding gas pressures and currents, Tungsten inert gas welding (TIG) of stainless steel (304) sheet was used to obtain their influence on the maximum bending force of the (TIG) welded joints. Design of experiment (DOE) ‘version 10' was used to determine the design matrix of experiments depending on the used levels of the input factors. Response surface methodology (RSM) technique was used to obtain an empirical mathematical model for the maximum bending force as a function of welding parameters (Current and Argon gas pressure). Also, the analysis of variance (ANOVA) was used to verif

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref