Most of drinking water consuming all over the world has been treated at the water treatment plant (WTP) where raw water is abstracted from reservoirs and rivers. The turbidity removal efficiency is very important to supply safe drinking water. This study is focusing on the use of multiple linear regression (MLR) and artificial neural network (ANN) models to predict the turbidity removal efficiency of Al-Wahda WTP in Baghdad city. The measured physico-chemical parameters were used to determine their effect on turbidity removal efficiency in various processes. The suitable formulation of the ANN model is examined throughout many preparations, trials, and steps of evaluation. The predict
Lead remediation was achieved using simple cost, effective and eco-friendly way from industrial wastewater. Phragmitesaustralis (P.a) (Iraqi plant), was used as anovel biomaterial to remove lead ions from synthesized waste water. Different parameters which affected on adsorption processes were investigated like adsorbent dose, pH, contact time, and adsorbent particle size, to reach the optimized conditions (maximum adsorption). The adsorption of Pb (?) on (P.a) involved fast and slow process as a mechanism steps according to obey two theoretical adsorption isotherms; Langmuir and Freundlich. The thermos dynamic adsorption parameters were evaluated also. The (?H) obtained positive value that meanes adsorption of lead ions was an endothermic
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreThe typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.
The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear
... Show MoreIn this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show MoreThis study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show More