The performance of sewage pumps stations affected by many factors through its work time which produce undesired transportation efficiency. This paper is focus on the use of artificial neural network and multiple linear regression (MLR) models for prediction the major sewage pump station in Baghdad city. The data used in this work were obtained from Al-Habibia sewage pump station during specified records- three years in Al-Karkh district, Baghdad. Pumping capability of the stations was recognized by considering the influent input importance of discharge, total suspended solids (TSS) and biological oxygen demand (BOD). In addition, the chemical oxygen demands (COD), pH and chloride (Cl). The proposed model performance has compared with the correlation coefficient (r). The suitable structure design of neural network model is examined through many trials, error, preparations and evaluation steps. Two prediction models of organic and sediment loading are presented. Result found that the estimating of the organic and sediment loading by ANN model could be successful. Moreover, results showed that influent discharge rate have more effect on organic and sediment loading predicting to other parameters.
Light naphtha treatment was achieved over 0.3wt%Pt loaded-alumina, HY-zeolite and Zr/W/HY-zeolite catalysts at temperature rang of 240-370°C, hydrogen to hydrocarbon mole ratio of 1-4 0.75-3 wt/wt/hr, liquid hourly space velocity (LHSV) and at atmospheric pressure. The hydroconversion of light naphtha over Pt loaded catalyst shows two main reactions; hydrocracking and hydroisomerization reactions. The catalytic conversion of a light naphtha is greatly influenced by reaction temperature, LHSV, and catalyst function. Naphtha transformation (hyroisomerization, cracking and aromatization) increases with decreasing LHSV and increasing temperature except hydroisomerization activity increases with increasing of temperature till 300°C then began
... Show MoreThis research aims to identify how organizational compatibility, which represents the independent variable, affects higher performance, which is considered a dependent variable, given the importance of these variables in industrial organizations and their clear impact on their stability, survival, and growth in the light of changing environmental challenges. Where the practical research problem was represented by the weakness of awareness of the importance toward organizational compatibility and its dimensions (organizational loyalty, organizational similarity, affiliation or membership, compatibility with goals, and compatibility with values), which is meant by the individual's compatibility with the organization in which he/she w
... Show MoreThis paper aims to investigate the flexural behavior of reinforced concrete beams considering fire resistance by adding Lightweight Expanded Clay Aggregates (LECA) to the concrete mix as partial coarse aggregate replacement. LECA is a type of porous clay with a uniform pore structure with fine, closed cells and hard, tightly sintered skin. The experimental work comprised four reinforced self-compacted concrete beams. All the specimens were identical in their geometrical layout of 1600×240×200 mm, reinforcement details, and support condition (simply supported). For all the beams, the main reinforcement was provided by two bars, each having a diameter of 12 mm, while a bar of 6 mm diameter was employed for the top and shear reinforc
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More