Artificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forward ANN, based on influent BOD5, COD and TSS concentrations. ANN ideal performance was measured based on the MSE and 2 values. Higher 2 value up to 94.1% with lowest MSE value were achieved suggesting good performance prediction by the model and its successful employment for the estimation of daily BOD5/COD ratio of SBR biological wastewater treatment effluent.
This study involved the treatment of textile wastewater contaminated with direct blue 15 dye (DB15) using a heterogeneous photo-Fenton-like process. Bimetallic iron/copper nanoparticles loaded on bentonite clay were used as heterogeneous catalysts and prepared via liquid-phase reduction method using eucalyptus leaves extract (E-Fe/Cu@BNPs). Characterization methods were applied to resultant particles (NPs), including SEM, BET, and FTIR techniques. The prepared NPs were found with porous and spherical shapes with a specific surface area of particles was 28.589 m2/g. The effect of main parameters on the photo-Fenton-like degradation of DB15 was investigated through batch and continuous fixed-bed systems. In batch mode, pH, H2O2 dosage, DB15 c
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show More“Smart city” projects have become fully developed and are actively using video analytics. Our study looks at how video analytics from surveillance cameras can help manage urban areas, making the environment safer and residents happier. Every year hundreds of people fall on subway and railway lines. The causes of these accidents include crowding, fights, sudden health problems such as dizziness or heart attacks, as well as those who intentionally jump in front of trains. These accidents may not cause deaths, but they cause delays for tens of thousands of passengers. Sometimes passers-by have time to react to the event and try to prevent it, or contact station personnel, but computers can react faster in such situations by using ethical
... Show MoreObjectives: Assessment outcome of DOTS (Directly observed therapy short course) program in Al-Sader City
Sector that was established by the WHO.
Methodology: Three cohorts groups of patients attending Baghdad TB institute and TB center in Al-Sader city
were followed retrospectively. The 1st cohort included (314) patients registered in year (2003), the 2nd cohort
included (327) patients registered in year (2004), the 3rd cohort included (321) patients registered in year
(2005). The collected data were analyzed for case detection, treatment outcomes, retreatment outcomes,
treatment success, and retreatment success in regard to time, age and sex.
Results: The following rates were extracted for the three cohort: Case det
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
In this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation