Marshlands environment in southern Iraq is unique and is considered a habitat of thousands of migratory birds as shelter and a source of livelihood for thousands of people living there. Its environment is characterized by a fragile ecosystem that requires great care and effort to achieve the greatest possible balance and parallelism of development, which necessarily require careful environmental planning that accurately regulates the resources of the environment and therefore, planned the best way to use them. The idea of research for creating the spatial organization of the development of the human settlements and taking into account the environmental aspect by thinking for the planning of development, creating environmental vision for the present and a future that will contribute to organization of human settlements and sustainable spatial development. For achieving that, the research uses Environmental Impact Assessment (EIA) and the Geographic Information Systems (GIS) as techniques for analyzing and choosing the appropriate zones for development and environmental planning. The research concluded to suggest the environmental sensitivity zones, and the appropriate projects that can be established in these zones as well as evaluated with EIA approaches, and the most important recommendation is the need to commitment by the environmental sensitivity zones map for appropriate development.
Porous materials play an important role in creating a sustainable environment by improving wastewater treatment's efficacy. Porous materials, including adsorbents or ion exchangers, catalysts, metal–organic frameworks, composites, carbon materials, and membranes, have widespread applications in treating wastewater and air pollution. This review examines recent developments in porous materials, focusing on their effectiveness for different wastewater pollutants. Specifically, they can treat a wide range of water contaminants, and many remove over 95% of targeted contaminants. Recent advancements include a wider range of adsorption options, heterogeneous catalysis, a new UV/H2O
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThis study aimed to assess the efficiency of Nerium oleander in removing three different metals (Cd, Cu, and Ni) from simulated wastewater using horizontal subsurface flow constructed wetland (HSSF-CW) system. The HSSF-CW pilot scale was operated at two hydraulic retention times (HRTs) of 4 and 7 days, filled with a substrate layer of sand and gravel. The results indicated that the HSSF-CW had high removal efficiency of Cd and Cu. A higher HRT (7 days) resulted in greater removal efficiency reaching up to (99.3% Cd, 99.5% Cu, 86.3% Ni) compared to 4 days. The substrate played a significant role in removal of metals due to adsorption and precipitation. The N. oleander plant also showed a good tolerance to the uptake of Cd, Cu, and Ni ions fr
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThe esterification reaction of ethyl alcohol and acetic acid catalyzed by the ion exchange resin, Amberlyst 15, was investigated. The experimental study was implemented in an isothermal batch reactor. Catalyst loading, initial molar ratio, mixing time and temperature as being the most effective parameters, were extensively studied and discussed. A maximum final conversion of 75% was obtained at 70°C, acid to ethyl alcohol mole ratio of 1/2 and 10 g catalyst loading. Kinetic of the reaction was correlated with Langmuir-Hanshelwood model (LHM). The total rate constant and the adsorption equilibrium of water as a function of the temperature was calculated. The activation energies were found to be as 113876.9 and -49474.95 KJ per Kmol of ac
... Show More