The Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The developed ANN mode gave a high correlation coefficient reaching 0.927 for the prediction of TDS from the model and showed high levels of TDS in Al-Hawizeh marsh that pose threats to people using the marsh for drinking and other uses. The dissolved Oxygen concentration has the highest importance of 100% in the model because the water of the marsh is fresh water, while Turbidity had the lowest importance.
In this paper the wind data that is measured for 12 months (January to December 2011) at Al-Hay district of Wasit province, southern IRAQ country has been analyzed statistically. The wind speed at heights of 10 m above ground level was measured for every 10 minutes interval. The statistical analysis of wind data was performed using WAsP software which is based on Weibull distributions. The Weibull shape and scale parameters is obtained and used in this paper statistics. The achieved results demonstrated that the study area has Annual Mean Energy Production (AMEP) about 219.002 MWh. The computations have been performed on 70m hub‟s height of the turbine and on Earth surface roughness length (0.0, 0.03, 0.1, 0.4, 1.5) m respectively.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MorePhytoplankton flora in southern marshes of govemorate Al- Basrah ( Al-SallaJ marsh ) Meissan (Al- Hwizah marsh) and Di-qar (Al Chebiaysh marsh ) were studied from August 12005 to November /2005,
Four Stations were Chosen in each marsh. Identified species and total
cell count were recorded . As aquality study, (35) species of algae were identified belonged to (23) genus in Al-Sallal marsh , (46) speci
... Show MoreThis paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics
... Show MoreIn this paper we give definitions, properties and examples of the notion of type Ntopological space. Throughout this paper N is a finite positive number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (ïNN'S), that is we applied the definition of this space in computer field and specially in parallel processing
Waters of some wells at Almuqdadea region Diyala province, east of Iraq have been
compared with wells at Alfalluja region, Alanbar province west of Iraq. Five wells were
selected randomly at each of the two regions to measure several factors represented by
temperature (C), P
H
, Electric Conductivity (EC), Sodium (Na),Calcium (Ca), Magnesium
(Mg),Total Hardness (TH), Carbonate (Co3),Chloride (Cl), Nitrite (NO2), Nitrate (NO3)
Phosphate (PO4) Sulfate (So4), in addition to the heavy metals such as Chromium (Cr),
Cadmium (Cd) Lead (Pb) & Iron (Fe). The mean concentration of the above factors in water
of wells at the above regions had been measured during the period from April to September
(2010).
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreThe calculation of the oil density is more complex due to a wide range of pressuresand temperatures, which are always determined by specific conditions, pressure andtemperature. Therefore, the calculations that depend on oil components are moreaccurate and easier in finding such kind of requirements. The analyses of twenty liveoil samples are utilized. The three parameters Peng Robinson equation of state istuned to get match between measured and calculated oil viscosity. The Lohrenz-Bray-Clark (LBC) viscosity calculation technique is adopted to calculate the viscosity of oilfrom the given composition, pressure and temperature for 20 samples. The tunedequation of state is used to generate oil viscosity values for a range of temperatu
... Show MoreThe finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemi