In this work, plasma parameters such as, the electron temperature )Te(, electron density ne, plasma frequency )fp(, Debye length )λD(
and Debye number )ND), have been studied using optical emission spectroscopy technique. The spectrum of plasma with different values of energy, Pb doped CuO at different percentage (X=0.6, 0.7, 0.8) were recorded. The spectroscopic study for these mixing under vacuum with pressure down to P=2.5×10-2 mbar. The results of electron temperature for X=0.6 range (1.072-1.166) eV, for X=0.7 the Te range (1.024-0.855) eV and X=0.8 the Te is (1.033-0.921) eV. Optical properties of CuO:Pb thin films were determined through the optical transmission method using ultraviolet visible spectrophotometer within the range (190 – 1100) nm.
A complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵) have been obtained. A new representation of their tensor product is naturally arisen and computed in details.
This research, involved a series of some new compounds containing different hetero cyclic new pentagonal and hexagonal rings, through the reaction of 2-mercapto-3-phenyl-4(3H)quinazolinone (1) with chloroacetylchloride in the presence of potassium hydroxide, and dry dimethylformamide (DMF) as a solvent to obtain the intermediate compound (2). This compound is reacted with different reagents to give four routes, the first route include direct reaction with substituted-2-aminobenzothiazole under certain conditions to give new compounds (3-9). The second route involved condensation compound (2) with 5-substituted-2-amino-1,3,4-oxadiazole in the presence of potassium carbonate anhydrous to give new compounds (10-13).while the third route inv
... Show MoreData security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreWisconsin Breast Cancer Dataset (WBCD) was employed to show the performance of the Adaptive Resonance Theory (ART), specifically the supervised ART-I Artificial Neural Network (ANN), to build a breast cancer diagnosis smart system. It was fed with different learning parameters and sets. The best result was achieved when the model was trained with 50% of the data and tested with the remaining 50%. Classification accuracy was compared to other artificial intelligence algorithms, which included fuzzy classifier, MLP-ANN, and SVM. We achieved the highest accuracy with such low learning/testing ratio.
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreIn this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.
n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThere are a few studies that discuss the medical causes for diabetic foot (DF) ulcerations in Iraq, one of them in Wasit province. The aim of our study was to analyze the medical, therapeutic, and patient risk factors for developing DF ulcerations among diabetic patients in Baghdad, Iraq.
Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show More