This study was aimed to investigate the response surface methodology (RSM) to evaluate the effects of various experimental conditions on the removal of levofloxacin (LVX) from the aqueous solution by means of electrocoagulation (EC) technique with stainless steel electrodes. The EC process was achieved successfully with the efficiency of LVX removal of 90%. The results obtained from the regression analysis, showed that the data of experiential are better fitted to the polynomial model of second-order with the predicted correlation coefficient (pred. R2) of 0.723, adjusted correlation coefficient (Adj. R2) of 0.907 and correlation coefficient values (R2) of 0.952. This shows that the predicted models and experimental values are in good agreement. The results of the kinetic study showed that the second-order kinetic model was in good agreement with the experimental results and suggested that the mechanism of chemisorption controlled the LVX adsorption. The experimental results indicated that the adsorption of LVX on iron hydroxide flocs follows Sips isotherm with the value of the correlation coefficient (R2) of 0.937. Sips isotherm shows that both homogenous and heterogeneous adsorption can occur.
The current research's problem includes the impact of cognitive reappraisal and reformulate on self-experience of emotional response and its negative feelings and the activity of cognitive reappraisal in changing response. The aim of this research is to detect the relation between adaptive response and cognitive reappraisal upon students of secondary school, and to find differences in gender and stage. The sample contained male and female student for the year(2022-2023) and consists of (480) students (240) male and (240) female in the karkh education/ 1 To achieve this aims researcher used descriptive method and to measure the two variables researcher built a scale for adaptive response according to theory of compound emotion (Barrett,20
... Show Morentroduction. Finding a safe innate immune response stimulator is one of the greatest challenges facing immunologists and vaccine manufacturers. Gap statement. The role of sterile bacterial secretions (SBSs) of Pseudomonas aeruginosa in stimulating the innate immune response was not investigated previously. Aim. The comparative effect of SBSs and bacterial cells of P. aeruginosa isolates isolated from freshwater (PAE) and infected wounds (PAC) on the respiratory tract innate immune response. Methodology. Four test mice groups were instilled intranasally (i.n.) with 106 c.f.u of PAC, 106 c.f.u of PAE, SBS of PAC, and SBS of PAE. Two control groups were given i.n. either LB broth or PBS. Time-course changes in IL-1 beta mRNA, TNF-alpha mRNA, I
... Show MoreExtractive multi-document text summarization – a summarization with the aim of removing redundant information in a document collection while preserving its salient sentences – has recently enjoyed a large interest in proposing automatic models. This paper proposes an extractive multi-document text summarization model based on genetic algorithm (GA). First, the problem is modeled as a discrete optimization problem and a specific fitness function is designed to effectively cope with the proposed model. Then, a binary-encoded representation together with a heuristic mutation and a local repair operators are proposed to characterize the adopted GA. Experiments are applied to ten topics from Document Understanding Conference DUC2002 datas
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreOptimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some stan
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
To ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and co
... Show MoreThis study aims to investigate the adequacy of composite cellular beams with lightweight reinforced concrete deck slab as a structural unit for harmonic loaded buildings. The experimental program involved three fixed-ends supported beams throughout 2140 mm. Three concrete types were included: Normal Weight Concrete (NWC), Lightweight Aggregate Concrete (LWAC), and Lightweight Fiber Reinforced Aggregate Concrete (LWACF). The considered frequencies were (5, 10, 15, 20, 25, and 30) Hz. It was indicated that the harmonic load caused a significant influence on LWAC response (64% greater than NWC) and lattice cracks were observed, especially at 30 Hz. As for LWACF slab, no cracks appeared,