Fruits sorting, recognizing, and classifying are essential post-harvest operations, as they contribute to the quality of food industry, thereby increasing the exported quantity of food. Today, an automated system for fruit classification and recognition is very important, especially when exporting to markets where quality of fruit must be high. In this study, the advantages and disadvantages of the various shape-based feature extraction algorithms and technologies that are used in sorting, classifying, and grading of fruits, as well as fruits quality estimation, are discussed in order to provide a good understanding of the use of shape-based feature extraction techniques.
Extraction of copper (Cu) from aqueous solution utilizing Liquid Membrane technology (LM) is more effective than precipitation method that forms sludge and must be disposed of in landfills. In this work, we have formulated a liquid surfactant membrane (LSM) that uses kerosene oil as the main diluent of LSM to remove copper ions from the aqueous waste solution through di- (2-ethylhexyl) phosphoric acid - D2EHPA- as a carrier. This technique displays several advantages including one-stage extraction and stripping process, simple operation, low energy requirement, and. In this study, the LSM process was used to transport Cu (II) ions from the feed phase to the stripping phase, which was prepared, using H2SO4. For LSM p
... Show MoreThis work deals with thermal cracking of three samples of extract lubricating oil produced as a by-product from furfural extraction process of lubricating oil base stock in AL-Dura refinery. The thermal cracking processes were carried out at a temperature range of 325-400 ºC and atmospheric pressure by batch laboratory reactor. The distillation of cracking liquid products was achieved by general ASTM distillation (ASTM D -86) for separation of gasoline fraction up to 220 ºC from light cycle oil fraction above 220 ºC. The comparison between the conversions at different operating conditions of thermal cracking processes indicates that a high conversion was obtained at 375°C, according to gasoline production. According to gasoline produ
... Show MoreDepletion of fossil fuel is one of the main reasons why the bioethanol has become popular. It is a renewable energy source. In order to meet the great demand of bioethanol, it is best that the bioethanol production is from cheap raw materials. Since the golden shower fruit is not being utilized and is considered as waste material, hence, this study was conducted to make use of the large volume of the residue as feedstock to test its potential for bioethanol extraction.The main goal of this study is to obtain the most volume of bioethanol from the golden shower fruit liquid residue by the factors, days of fermentation (3, 5, and 7 days) and sugar concentration (15, 20 and 25 brix) of the liquid residue. Also, part of the study is to compu
... Show MoreShaky Baghdad heavy crude oil 22 API is processed by distillation and solvent extraction. The purpose of distillation is to separate the light distillates (light fractions) which represent 35% of heavy crude oil, and to obtain the reduced crude oil. The heavy residue (9 API) is extracted with Iraqi light naphtha to get the deasphaltened oil (DAO), the extraction carried out with temperature range of 20-75 oC, solvent to oil ratio 5-15:1(ml:g) and a mixing time of 15 minutes. In general, results show that API of DAO increased twice the API of reduced crude oil while sulfur and metals content decreased 20% and 50% respectively. Deasphaltened oil produced from various operating conditions blended with the
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThis paper aims to early study of detection and diagnosis of kidney tumors and kidney stones using Computed Tomography Scanning CT scan images by digital image processing. Computerized Axial Tomography (CAT) is a special medical imaging technique that provides images with 3D, including much information about the body's construction consisting of bones and organs. A C.T scan uses X-rays to create cross-sectional images of the body and gives the doctor a full explanation of the diagnosis of the situation through the examination. It has been used in five cases of kidney images, including healthy, stones, tumors (cancer), cystic and renal fibrosis. The masking procedure is used to separate the required C.T. images
... Show MoreThe research aims to study some of the human characteristics of the state of Singapore to know the impact of these characteristics on the strength of the state, its development and. The research included two aspects, theoretical and analytical, using the descriptive analytical method, force analysis method, as well as the historical method. The data was analyzed according to mathematical equations, including the size of the country's population, the extraction of the population growth rate and the concept of age structure, where some indicators related to this concept have been explained. The researcher reached a set of results, the most important of which were: that the population size of the state of Singapore in the period between (19
... Show MoreAutism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this
... Show MoreThe recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semanti
... Show More