Preferred Language
Articles
/
ijcpe-391
Prediction of bubble size in Bubble columns using Artificial Neural Network
...Show More Authors

In the literature, several correlations have been proposed for bubble size prediction in bubble columns. However these correlations fail to predict bubble diameter over a wide range of conditions. Based on a data bank of around 230 measurements collected from the open literature, a correlation for bubble sizes in the homogenous region in bubble columns was derived using Artificial Neural Network (ANN) modeling. The bubble diameter was found to be a function of six parameters: gas velocity, column diameter, diameter of orifice, liquid density, liquid viscosity and liquid surface tension. Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 7.3 % and correlation coefficient of 92.2%. A comparison with selected correlations in the literature showed that the developed ANN correlation noticeably improved the prediction of bubble sizes. The developed correlation also shows better prediction over a wide range of operation parameters in bubble columns.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis on Multiple Device Connections of Small Office Home Office Network
...Show More Authors

Malaysia has been supported by one of the high-speed fiber internet connections called TM UniFi. TM UniFi is very familiar to be used as a medium to apply Small Office Home Office (SOHO) concept due to the COVID-19 pandemic. Most of the communication vendors offer varieties of network services to fulfill customers' needs and satisfaction during the pandemic. Quality of Services is queried by most users by the fact of increased on users from time to time. Therefore, it is crucial to know the network performance contrary to the number of devices connected to the TM UniFi network. The main objective of this research is to analyze TM UniFi performance with the impact of multiple device connections or users' services. The study was conducted

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Advance Science And Technology
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of artificial intelligence in achieving Customer satisfaction and its reflection on cost accounting: An applied research in the Iraqi electronic industries company
...Show More Authors

Based economic units to technology to add innovations that lead to contribute to customer satisfaction, under intense competition and rapid development in customer taste, the economic units tend to apply the concepts that contribute to customer satisfaction led by the introduction of artificial intelligence techniques. In the production prominent role in the contributing and responding to the rapid changes in customer tastes, and consequent impact this in achieving customer satisfaction. Search gained importance of relying on artificial intelligence techniques to achieve customer satisfaction through speed of response to changes in the tastes of customers and thus be able to increase its market share، and sales growth، and to achieve a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Materials
Prediction of the Bending Strength of a Composite Steel Beam–Slab Member Filled with Recycled Concrete
...Show More Authors

This study investigated the structural behavior of a beam–slab member fabricated using a steel C-Purlins beam carrying a profile steel sheet slab covered by a dry board sheet filled with recycled aggregate concrete, called a CBPDS member. This concept was developed to reduce the cost and self-weight of the composite beam–slab system; it replaces the hot-rolled steel I-beam with a steel C-Purlins section, which is easier to fabricate and weighs less. For this purpose, six full-scale CBPDS specimens were tested under four-point static bending. This study investigated the effect of using double C-Purlins beams face-to-face as connected or separated sections and the effect of using concrete material that contains different recycled

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Time Prediction of Dynamic Behavior of Glass Fiber Reinforced Polyester Composites Subjected to Fluctuating Varied Temperatures
...Show More Authors

The reduction of vibration properties for composite material (woven roving E-glass fiber plies in thermosetting polyester matrix) is investigated at the prediction time under varied combined temperatures (60  to -15) using three types of boundary conditions like (CFCF, CCCF, and CFCC). The vibration properties are the amplitude, natural frequency, dynamic elastic moduli (young modulus in x, y directions and shear modulus in 1, 2 plane) and damping factor. The natural frequency of a system is a function of its elastic properties, dimensions, and mass. The woven roving glass fiber has been especially engineered for polymer reinforcement; but the unsaturated thermosetting polyester is widely used, offering a good balance of vibration p

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Swelling Behavior and Drug Release of Interpenetrating Network Composed of PVA and Chitosan
...Show More Authors

     PVA and chitosan biodegradable, non-toxic, biocompatible polymers convenient for use in drug release.

In this study polyvinyl alcohol (PVA) and chitosan (CS) hydrogels crosslinked with glutaraldehyde (GA) with different ratio morphology and structure characterization interpenetrating polymer network (IPN).They were investigated by Fourier transmission infrared spectroscopy (FTIR), scanning electron microscope (SEM), UV-Visible spectrophotometer,swelling of hydrogel and drug release were studied by changing crosslinking ratio and PH.

 

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref