Water/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% concentration and 11 L/min flow rate; at 0.3 split ratio, was 70.8% at 10% concentration and 11 L/min flow rate; at split ratio 0.5, was 82.1% at 12.5% concentration and 11 L/min flow rate; at split ratio 0.7, was 70% at 11 L/min, for 5%, 7.5%, and 12.5% concentrations; at 0.9 split ratio was 96.8% at 11 L/min flow rate and 5% concentration. The maximum separation obtained within these ranges of variables was 96.8% at 0.9 split ratio, 11 L/min flow rate and 5% concentration. The maximum pressure drop recorded was 3.6 bar at split ratio 0.1 and 11 L/min flow rate for all concentrations. The correlations obtained by the dimensional analysis were; at split ratio 0.1, at split ratio 0.3, at split ratio 0.5, at split ratio 0.7, and at split ratio 0.9. As an average for all the studied variables.
The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreThe microstructure and wear properties of 392 Al alloy with different Mg contents were studied using centrifugal casting. All melted alloys were heated to 800 ºC and poured into the preheated centrifugal casting mold (200-250 ºC) at different mould rotational speeds (1500, 1900 and 2300 r.p.m). It is clear from the results obtained that wear rate was dependent on the Mg content, applied load and mould rotational speed. Furthermore, wear test showed that the minimum wear rate was found in the inner layer of produced rings at mould rotational speed of 1900 r.p.m and Mg content of 5%.
This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.
Subsurface soil water retention (SWRT) is a recent technology for increasing the crop yield, water use efficiency and then the water productivity with less amount of applied water. The goal of this research was to evaluate the existing of SWRT with the influence of surface and subsurface trickle irrigation on economic water productivity of cucumber crop. Field study was carried out at the Hawr Rajab district of Baghdad governorate from October 1st, to December 31st, 2017. Three experimental treatments were used, treatment plot T1 using SWRT with subsurface trickle irrigation, plot T2 using SWRT with surface trickle irrigation, while plot T3 without using SWRT and using surface tickle irrigation system. The obtained results showed th
... Show MoreThis work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators