The main work of this paper is devoted to a new technique of constructing approximated solutions for linear delay differential equations using the basis functions power series functions with the aid of Weighted residual methods (collocations method, Galerkin’s method and least square method).
The maintenance of the diesel engine parts in any electric power station contains many problems that lead to stopping. Several reasons lead to such problems; these reasons should be analyzed and evaluated in order to eliminate their effects. This paper is based on evaluation of the main causes that lead to diesel engine injector failure as a main part of electric power stations, using fault tree analysis (FTA). The FTA is the most broadly utilized strategies in the industrial area to perform reliability analysis of complex designing frameworks. A fault tree is a logical representation of the relationship of basic events that lead to a given unwanted event (i.e., top event).
Starting with introducing the FTA and how it could be uti
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MorePseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The res
... Show MoreMembrane distillation (MD) is a hopeful desalination technique for brine (salty) water. In this research, Direct Contact Membrane Distillation (DCMD) and Air Gap Membrane Distillation (AGMD) will be used. The sample used is from Shat Al –Arab water (TDS=2430 mg/l). A polyvinylidene fluoride (PVDF) flat sheet membrane was used as a flat sheet form with a plate and frame cell. Several parameters were studied, such as; operation time, feed temperature, permeate temperature, feed flow rate. The results showed that with time, the flux decreases because of the accumulated fouling and scaling on the membrane surface. Feed temperature and feed flow rate had a positive effect on the permeate flux, while permeate temperatu
... Show MoreNanostructure of chromium oxide (Cr2O3-NPs) with rhombohedral structure were successfully prepared by spray pyrolysis technique using Aqueous solution of Chromium (III) chloride CrCl3 as solution. The films were deposited on glass substrates heated to 450°C using X-ray diffraction (XRD) shows the nature of polycrystalline samples. The calculated lattice constant value for the grown Cr2O3 nanostructures is a = b = 4.959 Å & c = 13.594 Å and the average crystallize size (46.3-55.6) nm calculated from diffraction peaks, Spectral analysis revealed FTIR peak characteristic vibrations of Cr-O Extended and Two sharp peaks present at 630 and 578 cm-1 attributed to Cr-O “stretching
... Show MoreIn this work, γ-Al2O3NPs were successfully biosynthesized, mediated aluminum nitrate nona hydrate Al(NO3)3.9H2O, sodium hydroxide, and aqueous clove extract in alkali media. The γ-Al2O3NPs were characterized by different techniques like Fourier transform infrared spectroscopy (FT-IR), UV-Vis spectroscopy, X-ray diffraction (XRD), scanning electron microscopy (SEM), energy–dispersive x-ray spectroscopy, transmission electron microscope (TEM), Energy-dispersive X-ray spectroscopy (EDX), and atomic force microscopy (AFM). The final results indicated the γ-Al2O3NPs nanoparticle size, bonds nature, element phase, crystallinity, morphology, surface image, particle analysis – threshold detection, and the topography parameter. The id
... Show MoreIn this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of
An agricultural waste (walnut shell) was undertaken to remove Cu(II) from aqueous solutions in batch and continuous fluidized bed processes. Walnut shell was found to be effective in batch reaching 75.55% at 20 and 200 rpm, when pH of the solution adjusted to 7. The equilibrium was achieved after 6 h of contacting time. The maximum uptake was 11.94mg/g. The isotherm models indicated that the highest determination coefficient belongs to Langmuir model. Cu (II) uptake process in kinetic rate model followed the pseudo-second-order with determination coefficient of 0.9972. More than 95% of the Cu(II) were adsorbed on the walnut shells within 6 h at optimum agitation speed of 800 rpm. The main functional groups responsible for biosorption of
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More