The proper operation, and control of wastewater treatment plants, is receiving an increasing attention, because of the rising concern about environmental issues. In this research a mathematical model was developed to predict biochemical oxygen demand in the waste water discharged from Abu-Ghraib diary factory in Baghdad using Artificial Neural Network (ANN).In this study the best selection of the input data were selected from the recorded parameters of the wastewater from the factory. The ANN model developed was built up with the following parameters: Chemical oxygen demand, Dissolved oxygen, pH, Total dissolved solids, Total suspended solids, Sulphate, Phosphate, Chloride and Influent flow rate. The results indicated that the constructed ANN model to predict BOD of the effluent gave a high degree of correlation reaching 93.5% with seven input parameters. This model can be queried to determine the best combination of operating conditions needed in the wastewater treatment plant to achieve the desired effluent disposal limits.
Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreIn this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreDue to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe exploitation of obsolete recyclable resources including paper waste has the advantages of saving resources and environment protection. This study has been conducted to study utilizing paper waste to adsorb phenol which is one of the harmful organic compound byproducts deposited in the environment. The influence of different agitation methods, pH of the solution (3-11), initial phenol concentration (30-120ppm), adsorbent dose (0.5-2.5 g) and contact time (30-150 min) were studied. The highest phenol removal efficiency obtained was 86% with an adsorption capacity of 5.1 mg /g at optimization conditions (pH of 9, initial phenol concentration of 30 mg/L, an adsorbent dose of 2 g and contact time of 120min and at room temperature).
... Show MoreThe analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.
The ternary equilibrium diagrams and tie-lines
... Show MoreThis study aims to test ceramic waste's capacity to remove nickel from aqueous solutions through adsorption. Ceramic wastes were collected from the Refractories Manufacturing Plant in Ramadi. Through a series of lab tests, the reaction time (5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 minutes, and Ni concentrations (20, 40, 60, and 80) were tested using ceramic wastes with a solid to liquid ratio of 2g/30ml. At a temperature of 30ºC, the pH, total dissolved solids (TDS), and electrical conductivity (EC) were all measured. The equilibrium time was set at 30 min. Thereafter, the sorption (%) somewhat increased positively with the Ni concentration. Freundlich's equation showed that the adsorption intensity is 1.1827 and the Freundlich c
... Show MoreThe biochar prepared from sawdust raw material was applied in this study for the treatment of wastewater polluted with methyl orange dye. The effect of pH (2-11), initial concertation (50-250 mg/L) and time were studied. The isotherm of Langmuir, Frendluch and temkin models studied. The Langmuir model was the best to explain the adsorption process, maximum uptake was 136.67 mg/g at 25Co of methyl orange dye. Equilibrium reached after four hours of contact for most adsorbents.The values of thermodynamic parameters ∆G were negative at various temperatures, so the process spontaneous, while ∆H values were 16683 j/mol and ∆S values was 60.82 j/mol.k.