Preferred Language
Articles
/
alkej-303
Modeling the removal of Cadmium Ions from Aqueous Solutions onto Olive Pips Using Neural Network Technique
...Show More Authors

The uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.

Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlation equal to 0.99798. The sensitivity analysis for outputs of ANN signified that the relative importance of initial pH equal to 38 % and it is the influential parameter in the treatment process, followed by initial concentration, agitation speed, biosorbent dosage, time and temperature

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Computer Assisted Immunohistochemical Score Prediction Via Simplified Image Acquisition Technique
...Show More Authors

Background: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimator a Smoothing Technique for Estimating Regression Function
...Show More Authors

    The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.

    In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes.  Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The efficiency of Using Attribute and Performance- Based Activity Methods to Raise the Level of Control Deviation A field study in Jaber Bin Hayyan Factory
...Show More Authors

Cost is the essence of any production process for it is one of the requirements for the continuity of activities so as to increase the profitability of the economic unit and to support the competitive situation in the market. Therefore, there should be an overall control to reduce the cost without compromising the product quality; to achieve this, the management should have detailed credible and reliable information about the cost to be measured, collected, understood and to analyze the causes for the spread of deviations and obstacles the management faces, and to search for the factors that trigger the emergence of these deviations and obstacles

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
The Approximation of Weighted Hölder Functions by Fourier-Jacobi Polynomials to the Singular Sturm-Liouville Operator
...Show More Authors

      In this work, a weighted H lder function that approximates a Jacobi polynomial which solves the second order singular Sturm-Liouville equation is discussed. This is generally equivalent to the Jacobean translations and the moduli of smoothness. This paper aims to focus on improving methods of approximation and finding the upper and lower estimates for the degree of approximation in weighted H lder spaces by modifying the modulus of continuity and smoothness. Moreover, some properties for the moduli of smoothness with direct and inverse results are considered.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
EFFECT OF DECISION OF INCREASING THE MINIMUM LIMIT OF THE CAPITAL IN THE IRAQI PRIVATE BANKING ACTIVITY: APPLIED STUDY IN A SAMPLE OF PRIVATE IRAQI BANKS
...Show More Authors

This research aims to show the sight at the importance of the private banking sector in Iraq and its role in financing of the investment projects , of the ability of Central Bank's decision to increase the minimum limit of capital for private banks to provide support to the economic activity and the development in Iraq. In addition to illustrate the importance of the capital increase, with a, and taking into notice the most important determinants that can stand in front of these banks in the beginning of the decision implementation, which in turn can lead to the most important proceedings that can contribute in the support of banks to implementation the decision.  Also, the research has highlighted the most important ways through wh

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Preparation and Spectral Study of New Complexes of Some Metal Ions with 3,5-Dimethyl-1H-Pyrazol-1-yl Phenyl Methanone
...Show More Authors

Many complexes of 3,5-dimethyl-1H-pyrazol-1-yl phenyl methanone with Cr(III), Co(II), Ni(II), Cu(II) and Cd(II) were synthesized and characterized by FT-IR, UV/visible spectra, elemental analysis, room temperature magnetic susceptibility and molar conductivity. Cd(II) complex was expected to have tetrahedral structure while all the other complexes were expected to have an octahedral structure.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Complexation Trends And Biological Activity Of Some Mixed Ligand Complexes Of Curcumin And 1:10-Phenanthroline With Selective Metal Ions
...Show More Authors

Mixed metal ligand complexes is reported with Curcumin (CUM) as a primary ligand and 1:10-phenanthroline (phen ) as secondary ligand. The structures of these complexes are confirmed by using FT-IR and UV- electronic spectroscopies, magnetic moments, melting points , molar conductivity measurements .and the metal % analysis revealed that the complexes analyze indicates a six coordinated as[M(CUM)( Phen)2]Cl, M=Mn (II), Co(II), Ni(II),Cu(II) ,Zn(II) , Cd(II) , Hg(II) and [M’ (CUM)( Phen)2]Cl2 M’= Cr(III) &. Fe(III). In-vitro antimicrobial studies on ( Curcumin and 1:10-phenanthroline ligands and mixed metal ligand complexes against {(Bacillus subtilis (G+) , Esherichia Coli (G-) and as well as antifungal activities against Candida albican

... Show More
Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Using VGG Models with Intermediate Layer Feature Maps for Static Hand Gesture Recognition
...Show More Authors

A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref