The aim of this work is to study reverse osmosis characteristics for copper sulfate hexahydrate (CuSO4.6H2O), nickel sulfate hexahydrate (NiSO4.6H2O) and zinc sulfate hexahydrate (ZnSO4.6H2O) removal from aqueous solution which discharge from some Iraqi factories such as Alnasser Company for mechanical industries. The mode of operation of reverse osmosis was permeate is removed and the concentrate of metals solution is recycled back to the feed vessel. Spiral-wound membrane is thin film composite membrane (TFC) was used to conduct this study on reverse osmosis. The variables studied are metals concentrations (50 – 150 ppm) and time (15 – 90 min). It was found that increasing the time results in an increase in concentration of metal in permeate, feed concentration in feed vessel and recovery percent. While, it was found that water flux, rejection percent and mass transfer coefficient is decreasing with increasing operating time. Also, it was found that the permeate concentration and feed concentration in feed vessel increases with increasing feed concentration, on the contrary, water flux, the percentage of recovery, rejection percent and mass transfer coefficient decreases with increasing the concentration of feed solution. The maximum rejection of copper, nickel, and zinc salts are 96.6%, 95.7% and 98.2% respectively. The maximum recovery percentage of copper, nickel, and zinc salts are 40.8%, 41.35% and 38.44% respectively. The pure water permeability constant was calculated for TFC membrane.
The feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show Moreteen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel
... Show MoreInvestigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreThis work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreElectrospinning is a novel technique that can be used to produce highly porous fibers with highly tunable properties. In this research, this technique is adopted to prepare the electrospun nanofiber membrane for membrane distillation application. A custom-built electrospinning setup was made to prepare the nanofibers membrane. Polyvinylidene fluoride (PVDF) polymer was used in the electrospinning process due to its high hydrophobicity. Electrospun (PVDF) nanofibers were tested in direct contact membrane distillation (DCMD) process using 0.6 M sodium chloride as a feed solution. The resulting nanofiber membrane exhibited high performance in DCMD (i.e. relatively high water flux and high salt rejection). It has been found
... Show More