The remove of direct blue (DB71) anionic dye on flint clay in aqueous solution was investigated by using a batch system for various dye concentrations. The contact time, pH, adsorbent dose, and temperature was studied under batch adsorption technique. The data of adsorption equilibrium fit with isotherm Langmuar and Freiundlich ,when the correlation coefficient used to elucidate the best fitting isotherm model. The thermodynamic parameters such as, ?Hº ,?Sº and ?Gº. Thermodynamic analysis indicated that the sorption of the dyes onto Flint clay was endothermic and spontaneous.
The efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in
... Show MoreThe coordination ability of the azo-Schiff base 2-[1,5-Dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethyl imino]-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylazo]-5- hydroxy-benzoic acid has been proven in complexation reactions with Co(II), Ni(II), Cu(II), Pd(II) and Pt(II) ions. The free ligand (LH) and its complexes were characterized using elemental analysis, determination of metal concentration, magnetic susceptibility, molar conductivity, FTIR, Uv-Vis, (1H, 13C) NMR spectra, mass spectra and thermal analysis (TGA). The results confirmed the coordination of the ligand through the nitrogen of the azomethine, Azo group (Azo) and the carboxylate ion with the metal ions. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and K are cal
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
In this research, the effects of both current and argon gas pressure on the bending properties of welded joints were studied. Using the possible ranges of welding gas pressures and currents, Tungsten inert gas welding (TIG) of stainless steel (304) sheet was used to obtain their influence on the maximum bending force of the (TIG) welded joints. Design of experiment (DOE) ‘version 10' was used to determine the design matrix of experiments depending on the used levels of the input factors. Response surface methodology (RSM) technique was used to obtain an empirical mathematical model for the maximum bending force as a function of welding parameters (Current and Argon gas pressure). Also, the analysis of variance (ANOVA) was used to verif
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More