in this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach
Iron oxide(Fe3O4) nanoparticles of different sizes and shapes were synthesized by solve-hydrothermal reaction assisted by microwave irradiation using ferrous ammonium sulfate as a metal precursor, oleic acid as dispersing agent, ethanol as reducing agent and NaOH as precipitating agent at pH=12. The synthesized Fe3O4 nano particles were characterized by X-ray diffraction (XRD), FTIR and thermal analysis TG-DTG. Sizes and shapes of Fe3O4 nanoparticles were characterized by Scanning Electron Microscopy (SEM), and atomic force microscopy (AFM).
This study focuses on the implementation of interfaces for human machine interaction (HMI) control and monitor automatic production line. The automatic production line can performance feeding, transportation, sorting functions. The objectives of this study are implemented two SCADA/HMI system using two different software. TIA portal software is used to build HMI, alarm, and trends in touch panel which is helped an operator to control and monitor the production line. LabVIEW software is used to build HMI and trends in the computer screen and is linked with Microsoft Excel (ME) to generate information table helped to monitor the performance of the pneumatic equipment. The production line can do performance feeding, transportation, sorting fun
... Show MoreIraqi crude Atmospheric residual fraction supplied from al-Dura refinery was treated to remove metals contaminants by solvent extraction method, with various hydrocarbon solvents and concentrations. The extraction method using three different type solvent (n-hexane, n-heptane, and light naphtha) were found to be effective for removal of oil-soluble metals from heavy atmospheric residual fraction. Different solvents with using three different hydrocarbon solvents (n-hexane, n-heptane, and light naphtha) .different variables were studied solvent/oil ratios (4/1, 8/1, 10/1, 12/1, and 15/1), different intervals of perceptual (15, 30-60, 90 and 120 min) and different temperature (30, 45, 60 and 90 °C) were used. The metals removal perce
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show More
This work focuses on the implementation of interfaces for human machine interaction (HMI) for control and monitor of automatic production line. The automatic production line which can performance feeding, transportation, sorting functions.
The objectives of this work are implemented two SCADA/HMI system using two different software. TIA portal software was used to build HMI, alarm, and trends in touch panel which are helped the operator to control and monitor the production line. LabVIEW software was used to build HMI and trends on the computer screen and was linked with Micros
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show More