In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably improved prediction of dispersed phase hold up. The developed correlation also
shows better prediction over a wide range of operation parameters in RDC columns.
Background: White spot lesion is the first visible sign of dental caries that is characterized by demineralized lesion underneath an intact surface. Several studies demonstrated that they could be treated using noninvasive techniques like the use of fluoride or casein phospho-peptide and amorphous calcium phosphate. Improvement in aesthetic outcomes by covering the demineralized enamel is one of the advantages of the use of resin infiltration and opal-ustre microabrasion, which are two new techniques that had been used for treatment of white spot lesion. The purpose of this study was to evaluate the impact of resin infiltration and microabrasion in the microhardness of the artificial white spot lesions at various depths. Material and method
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MorePeak ground acceleration (PGA) is one of the critical factors that affect the determination of earthquake intensity. PGA is generally utilized to describe ground motion in a particular zone and is able to efficiently predict the parameters of site ground motion for the design of engineering structures. Therefore, novel models are developed to forecast PGA in the case of the Iraqi database, which utilizes the particle swarm optimization (PSO) approach. A data set of 187 historical ground-motion recordings in Iraq’s tectonic regions was used to build the explicit proposed models. The proposed PGA models relate to different seismic parameters, including the magnitude of the earthquake (Mw), average shear-wave velocity (VS30), focal depth (FD
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy. Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when appropriate, was
... Show MoreObjective: to assess the predictive value of Doppler imaging of the uterine artery in the identification of early intrauterine abnormal pregnancy as compared to a normal intrauterine pregnancy.
Subjects and methods: one hundred and twenty pregnant ladies, at their 6-12 weeks of gestation, with a singleton pregnancy were included in this population-based case-control study. Thirty women with a missed miscarriage, 30 with hydatidiform mole, 30 with a blighted ovum, and 30 as a control group, without risk factors, underwent Doppler interrogation of the uterine arteries. Resistive index (RI), pulsatility index (PI), and the systolic/diastolic ratio (S/D) were measured for both sides. The t-test, or ANOVA test when a
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More