In this study, He's parallel numerical algorithm by neural network is applied to type of integration of fractional equations is Abel’s integral equations of the 1st and 2nd kinds. Using a Levenberge – Marquaradt training algorithm as a tool to train the network. To show the efficiency of the method, some type of Abel’s integral equations is solved as numerical examples. Numerical results show that the new method is very efficient problems with high accuracy.
This research was aimed to evaluate activity of Rosemary volatile oil and Nisin A in vivo and on B. cereus isolated from some canned meat products in vitro. The results showed that the activity of Rosemary volatile oil (2000 µg/ml) and Nisin A (350 µg\ml) attained to 27 and 19 mm inhibitory zone diameter respectively in well diffusion method. The viable plate count from samples of canned meat treated with effective concentration of Rosemary volatile oil and Nisin A were examined. The samples with Rosemary volatile oil was not showed any CFU/g after 9 days of preservation while sample with Nisin A and control observed 49 and 45 CFU/g respectively. In vivo experiment on mice, two weeks after oral dose of Rosemary volatile oil (2000
... Show MoreOne of the bigger problems in drinking water is disinfection by-products (DBPs) that come from chlorinated disinfection. This study’s goal was to evaluate the drinking water in Al-Yarmouk Teaching Hospital, Ibn Sina Hospital and Ibn-Al-Nafis Hospital. Samples were collected between October 2018 and September 2019. Physical and chemical characteristics of the water were studied, including (temperature, hydrogen ion (pH), total dissolved solids (TDS), electrical conductivity (EC), turbidity, free residual chlorine, total organic carbon (TOC), total trihalomethanes (THMs), total halo acetic acid (THAAs)). Data analysis showed the highest value of study temperature, pH, TDS, EC, turbidity, free residual chlorine and TOC which was
... Show MoreIn this study, the flavonoid and alkaloid content in the alcoholic extract of the shoots and flowers were identified in four species of the tribe Apieae / Apiacese : Ammi majus, Ammi visgana, Anethum graveolens and Foeniculum vulgaris, and the flavonoids that were detected are (Apigenin, Coumarin, Kaempferol and Quercetin). The species Foeniculum vulgaris has recorded the highest concentration of total flavonoid content (Shoots and Flowers) among the studied species, reaching 4139.2 µg / ml. The total alkaloids are estimated for these species, and the Foeniculum vulgaris has recorded the highest concentration of the total alkaloid content as well.
The purpose of this study is to underline the progression and development of research regarding oxygen-containing heterocycles as well as the contribution that some oxygen-containing heterocycles have made as anticancer medicines. A series of publications about the antitumor effects of derivatives of heterocyclic compounds containing an oxygen atom, such as furan, benzofuran, oxazole, benzoxazole, and oxadiazole, were evaluated, and their anticancer activities showed encouraging results when compared to those of established standard treatments.
This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreThe tactical side in application of offensive plans in basketball did not take a large in scientific research because it always change because it related in mental ability of players and for the condition of the game and researchers notice that from their followed a lot of games for Duhok basketball club in Iraq league. There is a problem that connected in games results it clears in weakness in application of offensive plans in all kind (man to man & zone defense & side ball plans & under basketball and half court). The goal of study concentrate by designing a sheet for som offensive plans for study and analysis to Duhok club on Asian Championship 2011 at the base the sample contained (Iraq Duhok & application science Jordan & Lebanon sport
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.