Preferred Language
Articles
/
QhZ0GIcBVTCNdQwCRTYG
Membrane Fouling Reduction for Reverse Osmosis System Using Zeta Rod
...Show More Authors

Reverse osmosis membrane desalination is one of the most significant water treatments that is used to offer freshwater. The aim of this research is to study the effect of controlling the value of the zeta potential on the suspended particles in the water and the proximity of the membrane surfaces in the colloidal solution, to keep the water stable electrically and disperse the colloidal particles. To achieve this aim, the experimental study was conducted in the Sanitary Engineering Laboratory, in the engineering college - University of Baghdad. Two systems were set up, one worked normally and the other worked by using the zeta rod placed before the reverse osmosis membrane. The results showed that the effect of the zeta rod increased all parameters (Total Dissolved Solids (TDS), Electric Conductivity (Ec), Tur., phosphate (pH), chlorine (Cl), calcium (Ca), Sodium (Na), and Fluoride (F)), when compared with the system that worked normally. This effect was due to the added effort of the colloidal particles that saved them in the suspension. This also improved the performance of the reverse osmosis membrane, by increasing the permeate flux by 23.6%, and decreasing the real feed pressure by 9.92%. Therefore, this effect increased the production of water in the system and extended the life of the membrane.The application of the zeta rod before the reverse osmosis membrane will affect the colloidal particles by adding them some efforts, so this keep them suspended and prevent the formation of sediments on the membrane

Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Ergodic Capacity for Evaluation of Mobile System Performance
...Show More Authors

In this research the performance of 5G mobile system is evaluated through the Ergodic capacity metric. Today, in an­­y wireless communication system, many parameters have a significant role on system performance. Three main parameters are of concern here; the source power, number of antennas, and transmitter-receiver distance. User equipment’s (UEs) with equal and non-equal powers are used to evaluate the system performance in addition to using different antenna techniques to demonstrate the differences between SISO, MIMO, and massive MIMO. Using two mobile stations (MS) with different distances from the base station (BS), resulted in showing how using massive MIMO system will improve the performance than the standar

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Investigation of Numerical Simulation for Adaptive Optics System
...Show More Authors

In this study, the performance of the adaptive optics (AO) system was analyzed through a numerical computer simulation implemented in MATLAB. Making a phase screen involved turning computer-generated random numbers into two-dimensional arrays of phase values on a sample point grid with matching statistics. Von Karman turbulence was created depending on the power spectral density. Several simulated point spread functions (PSFs) and modulation transfer functions (MTFs) for different values of the Fried coherent diameter (ro) were used to show how rough the atmosphere was. To evaluate the effectiveness of the optical system (telescope), the Strehl ratio (S) was computed. The compensation procedure for an AO syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Transactions On Computers
Neuromorphic System for Spatial and Temporal Information Processing
...Show More Authors

View Publication
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Heun Method Using to Solve System of NonLinear Functional Differential Equations
...Show More Authors

In this paper Heun method has been used to find numerical solution for first order nonlinear functional differential equation. Moreover, this method has been modified in order to treat system of nonlinear functional differential equations .two numerical examples are given for conciliated the results of this method.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Smart internet of things kindergarten garbage observation system using Arduino uno
...Show More Authors

<span lang="EN-US">Increase the in population and kindergarten number, especially in urban areas made it difficult to properly manage waste. Thus, this paper proposed a system dedicated to kindergartens to manage to dispose of waste, the system can be called smart garbage based on internet of things (SGI). To ensure a healthy environment and an intelligent waste in the kindergarten management system in an integrated manner and supported by the internet of things (IoT), we presented it in detail identification, the SGI system includes details like a display system, an automatic lid system, and a communication system. This system supplied capabilities to monitor the status of waste continuously and on IoT website can show the pe

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Spot Welding of Dissimilar Metals Using an Automated Nd:YAG Laser System
...Show More Authors

An assembled pulsed Nd:YAG laser-robot system for spot welding similar and dissimilar metals is presented in this paper. The study evaluates the performance of this system through investigating the possibility and accuracy of executing laser spot welding of 0.2 mm in thickness stainless steel grade AISI302 to 0.5 mm in thickness low carbon steel grade AISI1008. The influence of laser beam parameters (peak power, pulse energy, pulse duration, repetition rate, and focal plane position on the final gained best results are evaluated. Enhancement of the experimental results was carried by a computational simulation using ANSYS FLUENT 6.3 package code.

View Publication Preview PDF