Extraction, analysis and desaturation of gmelina seed oil using different soft computing approaches
نویسندگان
چکیده
منابع مشابه
Estimating scour below inverted siphon structures using stochastic and soft computing approaches
This paper uses nonlinear regression, Artificial Neural Network (ANN) and Genetic Programming (GP) approaches for predicting an important tangible issue i.e. scours dimensions downstream of inverted siphon structures. Dimensional analysis and nonlinear regression-based equations was proposed for estimation of maximum scour depth, location of the scour hole, location and height of the dune downs...
متن کاملcomparative dna interaction studies of antiviral drug, zidovudine and its complex using different instrumental methods
هدف از این مطالعه بررسی امکان استفاده از داروهای شناخته شده در درمان سایر بیماریها به عنوان داروهای ضد سرطان است. همچنین با استفاده از این داروها در ساختمان کمپلکس فلز می توان شاخص های دارویی بدست آمده را بررسی نمود. داروی ضد ویروس ایدز(hiv)به نام زیدوودین(azt)انتخاب و.کمپلکس.محلول.در.آب[pt(azt)2]cl2سنتزو به روشهای مختلف فیزیکی و شیمیایی شناسایی گردید. بر هم کنش مقایسه ای این دارو و کمپلکس پلا...
15 صفحه اولQuality and characteristics of ginseng seed oil treated using different extraction methods
Ginseng seed oil was prepared using compressed, solvent, and supercritical fluid extraction methods of ginseng seeds, and the extraction yield, color, phenolic compounds, fatty acid contents, and phytosterol contents of the ginseng seed oil were analyzed. Yields were different depending on the roasting pretreatment and extraction method. Among the extraction methods, the yield of ginseng seed o...
متن کاملSoftware Cost Estimation using Soft Computing Approaches
Software development has become an important activity for many modern organizations (Pressman, 1997). In fact the quality, cost, and timeliness of developed software are often crucial determinants of an organization’s success. There are significant financial and strategic implications for development projects in terms of activity scheduling and cost estimation. Software cost estimation is one o...
متن کاملSpeaker authentication system using soft computing approaches
Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the spe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: South African Journal of Chemical Engineering
سال: 2016
ISSN: 1026-9185
DOI: 10.1016/j.sajce.2016.07.001