Preferred Language
Articles
/
vRZlSIcBVTCNdQwCUEFm
Function Approximation Technique (FAT)-Based Adaptive Feedback Linearization Control for Nonlinear Aeroelastic Wing Models Considering Different Actuation Scenarios
...Show More Authors

Crossref
View Publication
Publication Date
Mon Sep 11 2023
Journal Name
Journal Of Chemical Technology & Biotechnology
Modeling and optimization of biodiesel from high free‐fatty‐acid chicken fat by non‐catalytic esterification and mussel‐shell‐catalyzed transesterification
...Show More Authors
Abstract<sec><title>BACKGROUND

In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 11 2023
Journal Name
Journal Of Chemical Technology &amp; Biotechnology
Modeling and optimization of biodiesel from high free‐fatty‐acid chicken fat by non‐catalytic esterification and mussel‐shell‐catalyzed transesterification
...Show More Authors
Abstract<sec><title>BACKGROUND

In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Estimating the reliability function of Kumaraswamy distribution data
...Show More Authors

The aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter  (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.

The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Estimate the Nonparametric Regression Function Using Canonical Kernel
...Show More Authors

    This research aims to review the importance of estimating the nonparametric regression function using so-called Canonical Kernel which depends on re-scale the smoothing parameter, which has a large and important role in Kernel  and give the sound amount of smoothing .

We has been shown the importance of this method through the application of these concepts on real data refer to international exchange rates to the U.S. dollar against the Japanese yen for the period from January 2007 to March 2010. The results demonstrated preference the nonparametric estimator with Gaussian on the other nonparametric and parametric regression estima

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate Kernel Ridge Regression Function in Multiple Regression
...Show More Authors

             In general, researchers and statisticians in particular have been usually used non-parametric regression models when the parametric methods failed to fulfillment their aim to analyze the models  precisely. In this case the parametic methods are useless so they turn to non-parametric methods for its easiness in programming. Non-parametric methods can also used to assume the parametric regression model for subsequent use. Moreover, as an advantage of using non-parametric methods is to solve the problem of Multi-Colinearity between explanatory variables combined with nonlinear data. This problem can be solved by using kernel ridge regression which depend o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 20 2026
Journal Name
ريمار
The Function of Time in Hebrew Children's Fiction
...Show More Authors

This research examines the use of time in Hebrew children's literature and how historical narratives about the biblical period and beyond formed an arena for narrative conflict between the 1960s and the mid-1980s. The research clarifies the nature of narrative time: the time of events within the story itself (the sequence of events، the rhythm، and the occasional shifts between past and present)، as well as the framing time، which is the historical period the narrator perceives as the backdrop to the narrative. It also explores the time of memory and the use of flashbacks، evocations، or temporal allusions that connect young readers to a collective past. Our research also addresses how Zionist narratives began to lose credibility afte

... Show More
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 06 2025
Journal Name
Aip Conference Proceedings
Solving 5th order nonlinear 4D-PDEs using efficient design of neural network
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref