This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This method has an average recovery percentage by 104%. This result was also supported by the precision, linearity, LOD and LOQ, i.e. 0.0775; 0.968; 0.00000256 and 0.000000775, respectively.
Research summarized in applying the model of fuzzy goal programming for aggregate production planning , in General Company for hydraulic industries / plastic factory to get an optimal production plan trying to cope with the impact that fluctuations in demand and employs all available resources using two strategies where they are available inventories strategy and the strategy of change in the level of the workforce, these strategies costs are usually imprecise/fuzzy. The plant administration trying to minimize total production costs, minimize carrying costs and minimize changes in labour levels. depending on the gained data from th
... Show MoreThe support vector machine, also known as SVM, is a type of supervised learning model that can be used for classification or regression depending on the datasets. SVM is used to classify data points by determining the best hyperplane between two or more groups. Working with enormous datasets, on the other hand, might result in a variety of issues, including inefficient accuracy and time-consuming. SVM was updated in this research by applying some non-linear kernel transformations, which are: linear, polynomial, radial basis, and multi-layer kernels. The non-linear SVM classification model was illustrated and summarized in an algorithm using kernel tricks. The proposed method was examined using three simulation datasets with different sample
... Show MoreThe reaction of poly (vinyl alcohol) (PV A) with Urea in (DMSO) resulted in uerthanised oxim, wr,ich reacted with diacetylmonoxime in a (DY.ISOfmethanol) to give anew type (N2) polymeric bidentate imine oxime ligand [HL], The ligand was reacted with MCh (where M= Co, Cu, and Hg). Under reflux in a (DMF/Methanol) mixture with (I:1) ratio to give Complexes of the general formula [M (T.)2]X, (where M= Co,Hg, Cu). All .:ompouncs have been characterized by spectroscopic methods [IR, U.V.-Vis, A tomi<;absorption] microanalysis along with conductivity measurements, from the above:: data the proposed molecular structure for Co,Cu, and Hg is a distorted. Tetrahedml
The problem of the study and its significance:
Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease
That is interested psychologists and doctors searchin
... Show More يهدف البحث إلى تحضير سلسلة جديدة من معقدات العناصر الانتقالية ثنائية التكافؤ (الكوبلت, النيكل, النحاس, الخارصين ,الكادميوم والزئبق) مع المركبات الحلقية غير المتجانسة (L1) و(L2) والمشتقة من تفاعل 2,1- فينيلين ثنائي امين وسايكلوهكسان -2,1-ثنائي امين مع المركب الوسطي (Pr) على التوالي. شخصت المعقدات ذات الصيغة العامة :- [M(L1or L2)Cl2] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني وقيا
... Show MoreThis paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.
Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system
The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show More