This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
The biochar prepared from sawdust raw material was applied in this study for the treatment of wastewater polluted with methyl orange dye. The effect of pH (2-11), initial concertation (50-250 mg/L) and time were studied. The isotherm of Langmuir, Frendluch and temkin models studied. The Langmuir model was the best to explain the adsorption process, maximum uptake was 136.67 mg/g at 25Co of methyl orange dye. Equilibrium reached after four hours of contact for most adsorbents.The values of thermodynamic parameters ∆G were negative at various temperatures, so the process spontaneous, while ∆H values were 16683 j/mol and ∆S values was 60.82 j/mol.k.
This study proposed control system that has been presented to control the electron lens resistance in order to obtain a stabilized electron lens power. This study will layout the fundamental challenges, hypothetical plan arrangements and development condition for the Integrable Optics Test Accelerator (IOTA) in progress at Fermilab. Thus, an effective automatic gain control (AGC) unit has been introduced which prevents fluctuations in the internal resistance of the electronic lens caused by environmental influences to affect the system's current and power values and keep them in stable amounts. Utilizing this unit has obtained level balanced out system un impacted with electronic lens surrounding natural varieties.
In this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe study investigates the water quality of the Orontes River, which is considered one of the important water recourses in Syria, as it is used for drinking, irrigation, swimming and industrial needs. A database of 660 measurements for 13 parameters concentrations used, were taken from 11 monitoring points distributed along the Orontes River for a period of five years from 2015-2019, and to study the correlation between parameters and their impact on water quality, statistical analysis was applied using (SPSS) program. Cluster analysis was applied in order to classify the pollution areas along the river, and two groups were given: (low pollution - high pollution), where the areas were classified according to the sources of pollution to w
... Show MoreAn adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThis paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, satura
... Show More