This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated that the best mathematical model is BOD= 0.786 (ln(COD))^2- 3.077E83/Exp(10T) + 1.76E+48/Exp(0.1TDS)- 5.6507/Exp(100Phe) With correlation coefficient of 0.873. The presented research demonstrates many conclusions regarding the relation between BOD and other pollutions, it is clear that the relation between BOD and COD is a direct relation, while it’s a reverse relation with other pollutions and it’s also clear that a linear model can be used to represent the relation between BOD and COD for a value of COD approximately less than (50 mg/L).
In this study, the feasibility of Forward–Reverse osmosis processes was investigated for treating the oily wastewater. The first stage was applied forward osmosis process to recover pure water from oily wastewater. Sodium chloride (NaCl) and magnesium chloride (MgCl2) salts were used as draw solutions and the membrane that was used in forward osmosis (FO) process was cellulose triacetate (CTA) membrane. The operating parameters studied were: draw solution concentrations (0.25 – 0.75 M), oil concentration in feed solution (FS) (100-1000 ppm), the temperature of FS and draw solution (DS) (30 - 45 °C), pH of FS (4-10) and the flow rate of both DS and FS (20 - 60 l/h). It was found that the water flux and oil concentration in FS increas
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.
An analytical form of the ground state charge density distributions
for the low mass fp shell nuclei ( 40 A 56 ) is derived from a
simple method based on the use of the single particle wave functions
of the harmonic oscillator potential and the occupation numbers of
the states, which are determined from the comparison between theory
and experiment.
For investigating the inelastic longitudinal electron scattering form
factors, an expression for the transition charge density is studied
where the deformation in nuclear collective modes is taken into
consideration besides the shell model space transition density. The
core polarization transition density is evaluated by adopting the
shape of Tass
The GPS navigation measurements become more widely used in many civilian and scientific application. All GPS navigation data holds many errors, the main error sources arise from the geodetic Datum variation when user apply the GPS measurements with the map. Geodetic datums define the size and shape of the earth and the origin and orientation of the coordinate systems used to map the earth surface. In this paper, the Datum transformation was evaluated in two mathematical methods to overcome the errors due to the difference between the WGS-84 and our country Datum Clarck-1880. The results was evaluated and investigated using Carmin GPS device for GCPs comparison, topographic map for Hilla city, mid Iraq 1:100000 scale, and two georefrencing
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreThe aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN
Feature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreModel birefringence was measured for elliptical-core fibers with low ellipticities, note the birefringence depends strongly on the frequency, especially when fiber is being operated near the higher mode cutoff where ν for circular fiber of the single-mode type that correspond to the birefringence maximum. When ν this also correspond to the birefringence maximum that can be introduced in an elliptical core fiber while still operating in the single-mode regime near the higher mode cutoff. Also the birefringence is proportional to the fiber core ellipticity when core ellipticity is much less than unity, but this birefringence deviates from the linear for the large core ellipticities.
The research sheds light on a new topic of international law, the most important of which is, around which there are still question marks and differences in most of its aspects, especially with regard to international liability for damage caused by cyber attacks in the virtual space, the last is the fifth area that appeared alongside other area (Land, sea, air and outer space) and in addition to being a space on which states depend in the performance of their functions and international relations, it is a new arena for war and a source of danger to the security of states, As the security exposure to the secrets of states increased due to espionage and piracy, and the attacks on the infrastructure of countries increased, and the silence o
... Show More