Preferred Language
Articles
/
joe-2884
FILTRATION MODELING USING ARTIFICIAL NEURAL NETWORK (ANN)
...Show More Authors

In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, with a
good degree of accuracy reaching 97.26, 95.92 and 86.43% respectively. These ANN models could be used as a support for workers in operating the filters in water treatment plants and to improve water treatment process. With the use of ANN, water systems will get more efficient, so reducing operation cost and improving the quality of the water produced.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Minimization of Toxic Ions in Waste Water Using Emulsion Liquid Membrane Technique
...Show More Authors

In the present study, the removal of zinc from synthetic waste water using emulsion liquid membrane extraction technique was investigated. Synthetic surfactant solution is used as the emulsifying agent. Diphenylthiocarbazon (ditizone) was used as the extracting agent dissolved in carbon tetrachloride as the organic solvent and sulfuric acid is used as the stripping agent. The parameters that influence the extraction percentage of Zn+2 were studied. These are the ratio of volume of organic solvent to volume of aqueous feed (0.5-4), ratio of volume of surfactant solution to volume of aqueous feed (0.2-1.6), pH of the aqueous feed solution (5-10), mixing intensity (100-1000) rpm, concentration of extracting agent (20-400) ppm, surfactant co

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Evaluation of Using Magnetized Water in Leaching Salts in Sandy Loam Soil
...Show More Authors

Many studies and researchers have reported significant evidence that some physical properties of water can be changed as it passes through a magnetic field that can improve water use.  This can have a promising potential for applications, especially in the fields of irrigation and drainage. In this research, magnetized water was used to leach salt-affected sandy loam soil. A test rig was designed and constructed to investigate the effects of magnetized water on leaching soil. The rig consists of a magnetization device that can provide variable intensity. Water was supplied from a constant head reservoir to the magnetization device then to the soils that were placed in plastic columns. Five different magnetic intensi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Sentiment Analysis on Roman Urdu Students’ Feedback Using Enhanced Word Embedding Technique
...Show More Authors

 

Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which perfo

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Turbid of Water By Using Fuzzy C- Means and Hard K- Means
...Show More Authors

In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected  from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 31 2025
Journal Name
International Journal Of Advanced Technology And Engineering Exploration
Breast cancer survival rate prediction using multimodal deep learning with multigenetic features
...Show More Authors

Breast cancer is a heterogeneous disease characterized by molecular complexity. This research utilized three genetic expression profiles—gene expression, deoxyribonucleic acid (DNA) methylation, and micro ribonucleic acid (miRNA) expression—to deepen the understanding of breast cancer biology and contribute to the development of a reliable survival rate prediction model. During the preprocessing phase, principal component analysis (PCA) was applied to reduce the dimensionality of each dataset before computing consensus features across the three omics datasets. By integrating these datasets with the consensus features, the model's ability to uncover deep connections within the data was significantly improved. The proposed multimodal deep

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Hexapod Robot Static Stability Enhancement using Genetic Algorithm
...Show More Authors

Abstract

Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each

... Show More
View Publication Preview PDF