In this paper, a fusion of K models of full-rank weighted nonnegative tensor factor two-dimensional deconvolution (K-wNTF2D) is proposed to separate the acoustic sources that have been mixed in an underdetermined reverberant environment. The model is adapted in an unsupervised manner under the hybrid framework of the generalized expectation maximization and multiplicative update algorithms. The derivation of the algorithm and the development of proposed full-rank K-wNTF2D will be shown. The algorithm also encodes a set of variable sparsity parameters derived from Gibbs distribution into the K-wNTF2D model. This optimizes each sub-model in K-wNTF2D with the required sparsity to model the time-varying variances of the sources in the spectrogram. In addition, an initialization method is proposed to initialize the parameters in the K-wNTF2D. Experimental results on the underdetermined reverberant mixing environment have shown that the proposed algorithm is effective at separating the mixture with an average signal-to-distortion ratio of 3 dB.
The large number of failure in electrical power plant leads to the sudden stopping of work. In some cases, the necessary reserve materials are not available for maintenance which leads to interrupt of power generation in the electrical power plant unit. The present study, deals with the determination of availability aspects of generator in unit 5 of Al-Dourra electric power plant. In order to evaluate this generator's availability performance, a wide range of studies have been conducted to gather accurate information at the level of detail considered suitable to achieve the availability analysis aim. The Weibull Distribution is used to perform the reliability analysis via Minitab 17, and Artificial Neural Networks (ANNs) by approaching o
... Show MoreIn this work, electron number density calculated using Matlab program code with the writing algorithm of the program. Electron density was calculated using Anisimov model in a vacuum environment. The effect of spatial coordinates on the electron density was investigated in this study. It was found that the Z axis distance direction affects the electron number density (ne). There are many processes such as excitation; ionization and recombination within the plasma that possible affect the density of electrons. The results show that as Z axis distance increases electron number density decreases because of the recombination of electrons and ions at large distances from the target and the loss of thermal energy of the electrons in high distance
... Show MoreIn the present study, 1-ethyl -3-methyllimidazolium acetate ionic liquid is introduced for extractive desulfurization of Iraqi kerosene (1622ppm) and compared with 1-ethyl -3- methyllimidazolium tetrafloroborate. The effect of ionic liquid/ fuel ratio (1/9, 1/4, 1/2), temperature (25, 30,40oC), stirring speed (300,450rpm) and time (10, 30, 90, 180, 360 min) were studied. Sulfur compound analysis was performed using X-Ray fluorescence. The ionic liquid with acetate anion (OAc) showed better performance than tetrafloborate (BF4). The maximum extraction efficiency was 32% achieved at 1/2 IL/Fuel and 40oC after 90min. The oxidation step using hydrogen peroxide (8ml/200ml), catalyzed by acetic acid (2ml) and followed by ionic liquid extraction h
... Show MoreThis approach was developed to achieve an accurate, fast, economic and sensitivity to estimation of diphenhydramine Hydrochloride. The dye that produced via reaction between diphenhydramine HCl with thymol blue in acidic medium pH ≈ 4.0. The ion pair method include an optimization study to formed yellowcolored that extraction by liquid – liquid method. The product separated of complexes by using by chloroform solution measured spectrophotometry at 400 nm. The analysis data at optimum conditions showed that linearity concentration in a range of calibration curve 1.0 – 50 μg /mL, limit of detectionand limit of quantification 0.0786 and 0.2358 μg/mL respectively. The molar absorptivity and Sandell’s sensitivity were 1.8 × 10 -4 L/mo
... Show MoreIn this study water quality index (WQI) was calculated to classify the flowing water in the Tigris River in Baghdad city. GIS was used to develop colored water quality maps indicating the classification of the river for drinking water purposes. Water quality parameters including: Turbidity, pH, Alkalinity, Total hardness, Calcium, Magnesium, Iron, Chloride, Sulfate, Nitrite, Nitrate, Ammonia, Orthophosphate and Total dissolved solids were used for WQI determination. These parameters were recorded at the intakes of the WTPs in Baghdad for the period 2004 to 2011. The results from the annual average WQI analysis classified the Tigris River very poor to polluted at the north of Baghdad (Alkarkh WTP) while it was very poor to very polluted in t
... Show MoreImage compression plays an important role in reducing the size and storage of data while increasing the speed of its transmission through the Internet significantly. Image compression is an important research topic for several decades and recently, with the great successes achieved by deep learning in many areas of image processing, especially image compression, and its use is increasing Gradually in the field of image compression. The deep learning neural network has also achieved great success in the field of processing and compressing various images of different sizes. In this paper, we present a structure for image compression based on the use of a Convolutional AutoEncoder (CAE) for deep learning, inspired by the diversity of human eye
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More