In this study, field results data were conducted, implemented in 64 biofilm reactors to analyses extract organic matter nutrients from wastewater through a laboratory level nutrient removal process, biofilm layer moving process using anaerobic aerobic units. The kinetic layer biofilm reactors were continuously operating in Turbo 4BIO for BOD COD with nitrogen phosphorous. The Barakia plant is designed to serve 200,000 resident works on biological treatment through merge two process (activated sludge process, moving bed bio reactio MBBR) with an average wastewater flow of 50,000 m3/day the data were collected annually from 2017-2020. The water samples were analysis in the central laboratory of the wastewater treatment plant in Barakia region by the Directorate Sanitation in Najaf is influential, wastewater at the treatment plant for Al-Bio-shaft saw major water quality parameters. The data was analysis of using a principal component approach a cluster study of the return-mass reactors. The results showed that the biological oxygen dem (BOD5, 126 mg / L), chemical oxygen dem (COD, 222 mg/L), total solids, total suspended solids (TSS, 223 mg/L) a pH of 7.6 over a period of 4years, also the optimum removal rate was 89 %of the BOD, under optimum conditions, 78 % of the chemical oxygen occurred in the air reactor by nitrification with an average ammonium removal yield of 67 %. The cluster analysis results showed that the years (2018, 2017, 2020) are a good level of treatment compared to 2020. The final effluent quality (an average value of three years) complies with the stringent regulations proposed by the Iraqi National Stards established by Regulation 25 of 1967 BOD / COD ratio were calculated Influence is 0.63 in total wastewater.
Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreIt is known that the oral administration of ibuprofen caused an irritation of stomach as a side effect due to its carboxylic moiety. Ibuprofen ester was synthesized by linking the carboxylic moiety of ibuprofen and the hydroxylic group of paracetamol to reduce its side effect. Study the kinetic hydrolysis of prepared ester was examined at different values of physiological pH (1.0, 5.8, 6.4 and 7.4) at 37 ± 0.1 of 1 hour period. Measurements of absorbance were carried out by UV-Visible spectrophotometer to follow the stability of ester, it showed Pseudo first order hydrolysis. The pH- apparent rate profiles of ester was exhibited a good stability at pH 1.0 and pH 5.8. Pharmacological activity in vivo of prepared ester was evaluated in re
... Show MoreTo synthesize new hydrazone derivatives of naproxen with enhanced anti-inflammatory activity and devoid the ulcerogenic side effects. Hydrazones were synthesized by conjugation of naproxen hydrazide with seven natural and synthetic aldehyde and ketone by using glacial acetic acid as catalyst. The synthesis has been carried out following simple methodology in excellent isolated yields.The structure of the synthesized derivatives has been characterized by elemental microanalysis (CHN), FTIR Spectroscopy, and other physicochemical properties.The anti- inflammatory activity of the synthesized compounds was evaluated in vivo using the egg-white induced edema model in rats, and the results of the biological assay was found to be comparable to Nap
... Show More