Baghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al- Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability and its capability to produce effluents that met the local standards. Coefficient of Reliability (COR) determination was done for effluent's concentrations of BOD5, COD, and TSS obtained from Al- Rustamiya WWTP for two years' data operation (2015-2016), using Iraqi standards concentrations. Generally, the results showed the effectiveness of Al-Rustamiya WWTP-(CAS and SBR system) was a major concern due to inadequate sewage treatment and that the plant effluents of both systems selected parameters BOD5, COD and TSS are not meeting the Iraqi standards due to many problems mainly were operational problems result in overall poor performance.
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThis study is conducted to determine the activity of plant Vica faba and two isolated from arbuscular mycorrhizae fungi (A,B) in bioremediation of soil pollution by Nickel and Lead elements in north and south of Baghdad city. The results showed that the average of soil pollution by Nickel and Lead elements in north of Baghdad was less than the average of soil pollution in the south of Baghdad which recorded 29.0,9.0PPm and 42.0, 25.0PPm respectively. The results show that the isolate A from the polluted soil is more active from isolate B which isolate from unpolluted soil for bioremediation. Vica faba recorded more in accumulate the Lead element in shoot system which was 19.65PPm and in root system was 27.2PPm and for Nickel element 24.65
... Show MoreIn this work we used the environmentally friendly method to prepared ZrO2 nanoparticles utilizing the extract of Thyms plant In basic medium and at pH 12, the ZrO2 NPs was characterized by different techniques such as FTIR, ultraviolet visible, Atomic force microscope, Scanning Electron Microscopy, X-ray diffraction and Energy dispersive X-ray. The average crystalline size was calculated using the Debye Scherres equation in value 7.65 nm. Atomic force microscope results showed the size values for ZrO2 NPs were 45.11nm, and there are several distortions due to the presence of some large sizes. Atomic force microscope results showed the typical size values for ZrO2 NPs were 45.11 nm, and there are several distortions due to the presence of so
... Show More