Preferred Language
Articles
/
FBYdxokBVTCNdQwCmI2_
Spectrophotometric Analysis of Quaternary Drug Mixtures using Artificial Neural network model
...Show More Authors

A Novel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twenty four samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.

Scopus
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Prediction of Monthly Fluoride Content in Tigris River using SARIMA Model in R Software
...Show More Authors

The need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2, 0, 0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlat

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Investigating of Charge Transfer in Cu/F8 Using Donor-Acceptor Model due Quantum Transition
...Show More Authors

in this paper, we study and investigate a simple donor-acceptor model for charge transfer formation using a quantum transition theory. The transfer parameters which enhanced the charge transfer and the rate of the charge transfer have been calculated. Then, we study the net charge transfer through interface of Cu/F8 contact devices and evaluate all transfer coefficients. The charge transfer rate of transfer processes is found to be dominated in the low orientation free energy and increased a little in decreased potential at interface comparison to the high potential at interface. The increased transition energy results in increasing the orientation of Cu to F8. The transfer in the system was more active when the system has large driving for

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Mathematical model of optical amplifier using nonlinear stimulated Brillouin scattering (SBS) in optical fiber
...Show More Authors

We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident We demonstrate the results of a mathematical model for investigation the nonlinear Stimulated Brillouin Scattering (SBS), which can be employed to achieve high optical amplifier. The SBS is created by interaction between the incident light and the acoustic vibration fiber. The design criteria and the amplification characteristic of the Brillouin amplifier is demonstrated and discussed for fiber Brillouin amplifier using different pump power with different fiber length. The results show, high Brillouin gain can

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Design of Achromatic Combined Quadrupole Lens Using the Modified Bell-Shaped Field Distribution Model
...Show More Authors

The optimization calculations are made to find the optimum properties of combined quadrupole lens consist of electrostatic and magnetic lenses to produce achromatic lens. The modified bell-shaped model is used and the calculation is made by solving the equation of motion and finding the transfer matrices in convergence and divergence planes, these matrices are used to find the properties of lens as the magnification and aberrations coefficients. To find the optimum values of chromatic and spherical aberrations coefficients, the effect of both the excitation parameter of the lens (n) and the effective length of the lens into account as effective parameters in the optimization processing

View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
International Journal Of Pharmaceutical Research
Detection of Kaposi’s Associated Herpesvirus in Saliva of Drug Related Immunosupressed Patient
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More