A new simple sensitive and selective spectrophotometric method has been developed for the analysis of vanadium(V) in three randomly chosen samples from river water at different locations by continuous flow injection analysis. The method based on the oxidation of pyrogallol by vanadium(V) in acidic solution to form color species and the same species was determined using homemade Ayah 6SX1-T-2D solar cell analyser . Chemical and physical parameters were investigated using the high intensity of snow white light emitted diode as a source. The linear dynamic range for the instrument response versus vanadium(V) concentration was 1-200 mg.L-1 with correlation coefficient r = 0.9920. The limit of detection (S/N=3) was 70 ng/ sample from the step wise dilution for the minimum concentration in the linear dynamic range of the calibration graph with RSD % of lower than 1% at 90 mg.L-1 (n=5) concentration of vanadium(V). The method was applied successfully for the determination of vanadium (V) in three river samples. A comparison was made between: both of the proposed methods and classical method (UV-Vis spectrophotometry at wave length 427 nm) using the standard additions method via the use of paired t-test. It was noticed that there was no significant difference between two methods at 95 % confidence level.
The current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,
... Show MoreBackground: Calcium hydroxide and calcium-silicate materials used as direct pulp capping materials. The aims of this in vitro study is to compare among these materials in, the calcium ion release and pH change in soaking water after immersion of materials’ specimens in deionized water. Also Solubility and water sorption of materials’ specimens measured after soaking time. Calcium-silicate materials used were Biodentine, TheraCal and MTA Plus. Materials and methods: Four materials used in this study; Urbical lining (as control group), Biodentine, TheraCal and MTA Plus. Ten discs fabricated from each tested material, by using plastic moulds of 9 mm diameter and 1 mm thickness. Each specimen was immersed in 10 ml of d
... Show MoreThe subject of this study is one of the most interactive media networks, which is the Instagram.The study uses a descriptive approach and focuses on how Instagram turns from a media tool to a marketing tool. The study problematic consists of this question: How Instagram turns to a marketing tool, and what are the advantages and the disadvantages for that?This study highlights the definition of Instagram, the creation of it and its improvement, the Instagram in Bahrain, the Instagram uses, the Instagram as a marketing tool, and the advantages and disadvantages of using Instagram for marketing.The study confirms that Instagram is a new media network, and focuses on how it develops on later stages and mentions the increase of the percentage
... Show MoreIn this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show More