In this work, microbubble dispersed air flotation technique was applied for cadmium ions removal from wastewater aqueous solution. Experiments parameters such as pH (3, 4, 5, and 6), initial Cd(II) ions concentration (40, 80, and 120 mg/l) contact time( 2, 5, 10 , 15, and 20min), and surfactant (10, 20and 40mg/l) were studied in order to optimize the best conditions .The experimental results indicate that microbubbles were quite effective in removing cadmium ions and the anionic surfactant SDS was found to be more efficient than cationic CTAB in flotation process. 92.3% maximum removal efficiency achieved through 15min at pH 5, SDS surfactant concentration 20mg/l, flow rate250 cm3/min and at 40mg/l Cd(II) ions initial concentration. The removal efficiency of cadmium ion was predicted through 11 neurons hidden layer, with a correlation coefficient of 0.9997 between ANN outputs and the experimental data and through sensitivity analysis, pH was found to be most significant parameter (25.13 %).The kinetic flotation order for cadmium ions almost first order and the removal rate constant (k) increases with decreasing the initial metal concentration.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe sorption of Cu2+ ions from synthetic wastewater using crushed concrete demolition waste (CCDW) which collected from a demolition site was investigated in a batch sorption system. Factors influencing on sorption process such as shaking time (0-300min), the initial concentration of contaminant (100-750mg/L), shaking speed (0-250 rpm), and adsorbent dosage (0.05-3 g/ml) have been studied. Batch experiments confirmed that the best values of these parameters were (180 min, 100 mg/l, 250 rpm, 0.7 g CCDW/100 ml) respectively where the achieved removal efficiency is equal to 100%. Sorption data were described using four isotherm models (Langmuir, Freundlich, Redlich-Peterson, and Radke-Prausnitz). Results proved that the pure ads
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreOne of the challenging and active research topics in the recent years is Facial Expression. This paper presents the method to extract the features from the facial expressions from still images. Feature extraction is very important for classification and recognition process. This paper involve three stages which contain capture the images, pre-processing and feature extractions. This method is very efficient in feature extraction by applying haar wavelet and Karhunen-Loève Transform (KL-T). The database used in this research is from Cohen-Kanade which used six expressions of anger, sadness fear, happiness, disgust and surprise. Features that have been extracted from the image of facial expressions were used as inputs to the neural networ
... Show MoreAbstract
This research aim to overcome the problem of dimensionality by using the methods of non-linear regression, which reduces the root of the average square error (RMSE), and is called the method of projection pursuit regression (PPR), which is one of the methods for reducing dimensions that work to overcome the problem of dimensionality (curse of dimensionality), The (PPR) method is a statistical technique that deals with finding the most important projections in multi-dimensional data , and With each finding projection , the data is reduced by linear compounds overall the projection. The process repeated to produce good projections until the best projections are obtained. The main idea of the PPR is to model
... Show MoreDiabetes is considered by the World Health Organization (WHO) as a main health problem globally. In recent years, the incidence of Type II diabetes mellitus was increased significantly due to metabolic disorders caused by malfunction in insulin secretion. It might result in various diseases, such as kidney failure, stroke, heart attacks, nerve damage, and damage in eye retina. Therefore, early diagnosis and classification of Type II diabetes is significant to help physician assessments.
The proposed model is based on Multilayer Neural Network using a dataset of Iraqi diabetes patients obtained from the Specialized Center for Endocrine Glands and Diabetes Diseases. The investigation includes 282 samples, o
... Show MoreEquilrium, kinetic and mechanistic studies for thcoordination of
|
some amino acids "'AA'1
glycine, alanine, .a:ncl histidine, to Cr (Ill)
center of trans .[Cr(ox}2(B.2 0hr {TJ'} cornplein monderarely acidic
range ofpH=4.8-6-.7 ( p =Q.4M NaN03) are reported. The equili rium
c.onsta:nts at 25°C .were found logKequ.=4.95J ,5.206and5.128for glycine, alap.ine, md
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show More