Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under detection is one of the results of the proposed classifier. The work demanded the collection of about 5000 color codes which in turn were subjected to algorithms for training and testing. The open-source platform TensorFlow for ML and the open-source neural network library Keras were used to construct the algorithm for the study. The results showed an acceptable efficiency of the built classifier represented by an accuracy of 90% which can be considered applicable, especially after some improvements in the future to makes it more effective as a trusted colorimeter.
A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreAlice Walker (1944) ranks among the greatest American writers of the twentieth century. Through her novels Meridian and the color Purple, Alice outlines many issues concerning the effect of authoritarian thinking upon its often innocent victims, and the possibility of meaningful, productive resistance. Walker's texts aim at giving a voice to those who have no voice especially those poor, rural black women who are robbed of power and the right to make decisions about their own lives by a range of forces standing against them. These texts also aim at clarifying how Walker's female protagonists, Meridian and Celia try to free themselves from oppression, misery , fear and underestimation
... Show MorePermanent deformation in asphalt concrete pavements is pervasive distress [1], influenced by various factors such as environmental conditions, traffic loading, and mixture properties. A meticulous investigation into these factors has been conducted, yielding a robust dataset from uniaxial repeated load tests on 108 asphalt concrete samples. Each sample underwent systematic evaluation under varied test temperatures, loading conditions, and mixture properties, ensuring the data’s comprehensiveness and reliability. The materials used, sourced locally, were selected to enhance the study ʼs relevance to pavement constructions in hot climate areas, considering different asphalt cement grades and con- tents to understand material variability ef
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreThe optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
Leaching process applied for the extraction of bio active compounds from dried roots of (Elecampane) Inula helenium. Ethanol, hexane and distillated water were used as solvents. Roots were soaked with ethanol (5% w/v) with various concentration of ethanol (30 to 98%) at one day to know effect concentration of the solvent with concentration of bio active compound in Inula helenium. The same procedure was done using hexane as solvent. Also distilled water was used as solvent for extraction 5%(w/v) where plant material was soaked in water at different temperatures (25, 40, 65, 80, and 90) C. In all solvents undertaken, the effect of time duration on active ingredient (Thymol, Isoalatolactone, Alatolactone, 10-isobutyryl-oxy 8-9-epoxy thymol is
... Show MoreThis study examined the effect of essential oils extracted from peel of Citrus paradisi and Citrus sinensis on two species of fungi: Penicillium oxalicum and Fusarium oxysporum as well as effect of two fungicides: Carbendazim and Thiophanatemethyl against above fungi. Results showed that the essential oil of Citrus paradisi inhibited the radial growth of Penicillium oxalicum and Fusarium oxysporum at concentration 4%. Nevertheless, the essential oil of Citrus sinensis inhibited the radial growth at concentration 5 and 4%, respectively. Furthermore, the two studied fungicides inhibited radial growth of these fungi too. Therefore, there are a positive relationship between the evaluating of concentration and the percentage of inhibiting of rad
... Show MoreThe efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi