In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, with a
good degree of accuracy reaching 97.26, 95.92 and 86.43% respectively. These ANN models could be used as a support for workers in operating the filters in water treatment plants and to improve water treatment process. With the use of ANN, water systems will get more efficient, so reducing operation cost and improving the quality of the water produced.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
Water is an essential aspect of life and important in evolution. Recently the potable water quality topic has received much attention. The study aims to determine drinking water quality in Al-Najaf City by collecting samples throughout Al-Najaf city and comparing the results with the Iraqi guidelines (IQS 417) and World Health Organization (WHO) guidelines, as well as to calculate the WQI. Samples were tested in the laboratory between December 2021 and June 2022. The results showed that multiple parameters exceeded the allowable limits during both testing periods; during winter months, the results of TDS and turbidity exceeded the upper limits in multiple locations. Total hardness values also
... Show MoreThis paper introduces a Laplace-based modeling approach for the study of transient converter-grid interactions. The proposed approach is based on the development of two-port admittance models of converters and other components, combined with the use of numerical Laplace transforms. The application of a frequency domain method is aimed at the accurate and straightforward computation of transient system responses while preserving the wideband frequency characteristics of power components, such as those due to the use of high frequency semiconductive switches, electromagnetic interaction between inductive and capacitive components, as well as wave propagation and frequency dependence in transmission systems.
In this paper, first and second order sliding mode controllers are designed for a single link robotic arm actuated by two Pneumatic Artificial Muscles (PAMs). A new mathematical model for the arm has been developed based on the model of large scale pneumatic muscle actuator model. Uncertainty in parameters has been presented and tested for the two controllers. The simulation results of the second-order sliding mode controller proves to have a low tracking error and chattering effect as compared to the first order one. The verification has been done by using MATLAB and Simulink software.
In our world, technological development has become inherent in all walks of life and is characterized by its speed in performance and uses. This development required the emergence of new technologies that represent a future revolution for a fourth industrial revolution in various fields, which contributed to finding many alternatives and innovative technical solutions that shortened time and space in terms of making Machines are smarter, more accurate, and faster in accomplishing the tasks intended for them, and we find the emergence of what is called artificial intelligence (artificial intelligence), which is the technology of the future, which is one of the most important outputs of the fourth industrial revolution, and artificial inte
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More