In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
High-performance liquid chromatographic methods are used for the determination of water-soluble vitamins with UV-Vis. Detector. A reversed-phase high-performance liquid chromatographic has been developed for determination of water-soluble vitamins. Identification of compounds was achieved by comparing their retention times and UV spectra with those of standards solution. Separation was performed on a C18 column, using an isocratic 30% (v/v) acetonitril in dionozed water as mobile phase at pH 3.5 and flow rate 1.0m/min. The method provides low detection and quantification limits, good linearity in a large concentration interval and good precision. The detection limits ranged from 0.01 to 0.025µg/ml. The accuracy of the method was
... Show MoreAn experiment was conducted in pots under field conditions during fall seasons of 2017 and 2018. This study aimed to improve a weak growth of seedlings under salt stress in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh, and Buhoth70). 2nd factor was seed priming (primed and unprimed seed). Seed were primed by soaking for 12 hours in a solution containing 300 + 70 mg L−1 of gibberellic (GA3) and salicylic (SA) acids, respectively. 3rd factor was irrigation with saline water (6, 9 and 12 dS m−1) resulting from dissolving sodium chloride in distilled water in addition to control treatment (distilled water). Randomized complete block design was used with four replications. In both seasons: the results sh
... Show MoreThe electrocoagulation process became one of the most important technologies used for water treatment processes in the last few years. It’s the preferred method to remove suspended solids and heavy metals from water for treating drinking water and wastewater from textile, diary, and electroplating factories. This research aims to study the effect of using the electrocoagulation process with aluminum electrodes on the removal efficiency of suspended solids and turbidity presented in raw water and optimizing by the response surface methodology (RSM). The most important variables studied in this research included electrode spacing, the applied voltage, and the operating time of the electrocoagulation process. The samples
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis paper presents an experimental study of cooling photovoltaic (PV) panels using evaporative cooling. Underground (geothermal energy) water used to extract heat from it during cooling and cleaning of PV panels. An experimental test rig was constructed and tested under hot and dusty climate conditions in Baghdad. An active cooling system was used with auxiliary an underground water tank to provide cold water as a coolant over both PV surfaces to reduce its temperature. The cellulose pad has been arranged on the back surface and sprays cooling on the front side. Two identical PV panels modules used: without cooling and evaporative water cooling. The experiments are comprised of four cases: Case (I): backside cooling, Ca
... Show More