In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Antibiotics present the greatest threat to soil and aquatic ecosystems among the different therapeutic groups of medicines (which include prescription drugs and treatments for cancer). The strongest drugs, antibiotics, have been utilized to stop the growth of microorganisms or eradicate them. Using high-performance liquid chromatography technology with fluorescence detection, the amounts of levofloxacin and tetracycline in the wastewater from three hospitals (Medical City, Al-Kindi, and Al-Yarmouk) were determined. Levofloxacin and tetracycline were chosen in this study because they are the most important water pollutants. These antibiotic residues were separated and measured using a gradient elution technique on a reverse-phase C18
... Show MoreThe Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units. This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized poros
... Show MoreThe Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units.
This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized por
... Show MoreSeparation of Trigonelline, the major alkaloid in fenugreek seeds, is difficult because the extract of these seeds usually contains Trigonelline, choline, mucilage, and steroidal saponins, in addition to some other substances. This study amis to isolate the quaternary ammonium alkaloid (Trigonelline) and choline from fenugreek seeds (Trigonella-foenum graecum L.) which have similar physiochemical properties by modifying of the classical method. Seeds were defatted and then extracted with methanol. The presence of alkaloids was detected by using Mayer's and Dragendorff's reagents. In this work, trigonilline was isolated with traces of choline by subsequent processes of purification using analytical and preparative TLC techniques.
... Show MoreThis work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThis work includes the synthesis and identification of ligand {3-((4-acetylphenyl)amino)-5,5-dimethylcyclohex2-en-1-one} (HL* ) by the treatment of 5,5-dimethylcyclohexane-1,3-dione with 4-aminoacetophenone under reflux. The ligand (HL* ) was identified via FTIR, Mass spectrum, elemental analysis (C.H.N.), 1H and 13C-NMR spectra, UV-Vis spectroscopy, TGA and melting point. The complexes were synthesized from ligand (HL* ) mixed with 3-aminophenol (A) and metal ion M(II), where M(II) = (Mn, Co, Ni, Cu, Zn and Cd) at alkaline medium to produce complexes of general formula [M(L* )(A)] with (1:1:1) molar ratio. These complexes were detected via FT-IR spectra, UV-Vis spectroscopy as well as elemental analysis (A.A) and melting point, conductivit
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More