Ration power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreIn this paper, several conditions are put in order to compose the sequence of partial sums , and of the fractional operators of analytic univalent functions , and of bounded turning which are bounded turning too.
Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
Background: The figure for the clinical application of computed tomography have been increased significantly in oral and maxillofacial field that supply the dentists with sufficient data enables them to play a main role in screening osteoporosis, therefore Hounsfield units of mandibular computed tomography view used as a main indicator to predict general skeleton osteoporosis and fracture risk factor. Material and Methods: Thirty subjects (7 males &23 females) with a mean age of (60.1) years underwent computed tomographic scanning for different diagnostic assessment in head and neck region. The mandibular bone quality of them were determined through Hounsfield units of CT scan images and were correlated with the bone mineral density v
... Show MoreZSM-5 zeolite was synthesis under hydrothermal conditions at 175oC. The synthesis parameters have been investigated to find optimum synthesis method. Firstly, the crystallization time has been investigated to find the optimum crystallization time. Also, the ageing time was studied. The morphology, structure, and composition of the synthesized ZSM-5 zeolite were characterized using scanning electron microscopy (SEM), pH meter, viscometer, and X-ray powder diffraction (XRD). The bulk Si/Al ratio of ZSM-5 zeolite was in the range of 9.5—11.7. The synthesized ZSM-5 zeolite with appropriate ageing time could adjust crystal size and degree of the crystallinity. The crystal size of ZSM-5 zeolite obtained at an agei
... Show MoreFusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper