A simple , sensitive and accurate spectrophotometric method for the trace determination of bismuth (III) has been developed .This method is based on the reaction of bismuth (III) with arsenazo(III) in acid solution (pH=1.9) to form a blue water soluble complex which exhibits maximum absorption at 612nm .Beer's law is obeyed over the concentration range of 2-85 ?g bismuth (III) in a final volume of 20 mL( i.e. 0.1 – 4.25?g.mL-1) with a correlation coefficient of (0.9981) and molar absorptivity 1.9×104 L.mol-1.cm-1 . The limit of detection (LOD) and the limit of quantification (LOQ) are 0.0633 and 0.0847 ?g.mL-1 , respectively . Under optimum conditions,the stoichiometry of the reaction between bismuth (III) and arsenazo(III) reagent was found to be 1:2. The recoveries were obtained in the range of 98.9 - 100.0% and a relative standard deviation of ±0.59 to ±2.73% depending on the concentration level of bismuth. The effect of interferences by a number of common cations and anions in the presence of composite mixture has been studied .The proposed method has been applied successfully for determination of bismuth in water samples and veterinary preparation .
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreNoor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of Missan Oil Company. The first two wells in the field were drilled in seventies and were not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous gas lift by using maximum production rate in the design.
The design was made after comparing the measured pressure with the calculated pressure, this comparison show that the method of Beggs-Brill and Petroleum Exper
... Show MoreYouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreIn most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More