In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Two types of adsorbents were used to treat oily wastewater, activated carbon and zeolite. The removal efficiencies of these materials were compared to each other. The results showed that activated carbon performed some better properties in removal of oil. The experimental methods which were employed in this investigation included batch and column studies. The former was used to evaluate the rate and equilibrium of carbon and zeolie adsorption, while the latter was used to determine treatment efficiencies and performance characteristics. Expanded bed adsorber was constructed in the column studies. In this study, the adsorption behavior of vegetable oil (corn oil) onto activated carbon and zeolite was examined as a function of the concentr
... Show MoreAbstract:Two-dimensional crystal has been achieved and controlled with the aid of DC electric field applied between two electrodes at 5 millimeters separating distance between them. Sol-gel method has been used to prepared nanosilica particle which used in this work as well as TiO2 nanopaowder. The assembly of the silica particles is due to the interaction between the electrical force, the particles dipole, and the interaction between the particles themselves. When a DC voltage is applied, the particles accumulated and crystallized on the surface between the electrodes. The Light diffraction demonstrates that the hexagonal crystal is always oriented with one axis along the direction of the field. The particles disassemble when the field is
... Show Moreأن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ
... Show MoreThis investigation aimed to explain the mechanism of MFCA by applying this method on air-cooled engine factory which was suffering from high production cost. The results of this study revealed that MFCA is a useful tool to identify losses and inefficiencies of the production process. It is found that the factory is suffering from high losses due to material energy and system losses. In conclusion, it is calculated that system losses are the highest among all the losses due to inefficient use of available production capacity.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreBackground: Implantology is a fast growing area in dentistry. One of the most common issues encountered in dental implantation procedures is the lack of adequate preoperative planning. Conventional radiography may not be able to assess the true regional three-dimensional anatomical presentation. Multi Slice Computed Tomography provides data in 3-dimentional format offering information on craniofacial anatomy for diagnosis; this technology enables the virtual placement of implant in a 3-Dimensional model of the patient jaw (dental planning). Patients, Material and Methods: The sample consisted of (72) Iraqi patients indicated for dental implant (34 male and 38 female), age range between (20-70) years old. They were examined during a time p
... Show MoreIt is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show MoreAbstract
The public budget in Iraq is still prepared according to the traditional base that allocates the amounts of budget the current year based on the budget of previous year with an increase in estimations with random proportions without connecting the input (financial, human resources and asset )with their output (quantitatively and qualitatively)this caused waste and lose in the available resources therefore the output of budget showed be adapted is such a way that achieving connection between its input and output and to be appropriate with the organizational structure of the state without intrinsic change in its work .this may be realized by adopting the accounting of
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreAlPO4 solid acid catalyst was prepared in order to use it in transesterification reaction of edible oil after supporting it with tungsten oxide. The maximum conversion of edible oil was obtained 78.78% at catalyst concentration (5gm.), temperature 70°Ϲ, 30/1 methanol/edible oil molar ratio, and time 5hr. The study of kinetics of the transesterification reaction of edible oil indicates that the reaction has an order of 3/2, while the value of activation energy for transesterification reaction is 51.367 kJ/mole and frequency factor equal 26219.13(L/ mol.minute).