Sewage water is a mixture of water and solids added to water for various uses, so it needs to be treated to meet local or global standards for environmentally friendly waste production. The present study aimed to analyze the new Maaymyrh sewage treatment plant's quality parameters statistically at Hilla city. The plant is designed to serve 500,000 populations, and it is operating on a biological treatment method (Activated Sludge Process) with an average wastewater inflow of 107,000m3/day. Wastewater data were collected daily by the Mayoralty of Hilla from November 2019 to June 2020 from the influent and effluent in the (STP) new in Maaymyrh for five water quality standards, such as (BOD5), (COD), (TSS), (TP)
... Show MoreIn this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not
... Show MoreCdO:NiO/Si solar cell film was fabricated via deposition of CdO:NiO in different concentrations 1%, 3%, and 5% for NiO thin films in R.T and 723K, on n-type silicon substrate with approximately 200 nm thickness using pulse laser deposition. CdO:NiO/n-Si solar cell photovoltaic properties were examined under 60 mW/cm2 intensity illumination. The highest efficiency of the solar cell is 2.4% when the NiO concentration is 0.05 at 723K.
This paper discusses reliability R of the (2+1) Cascade model of inverse Weibull distribution. Reliability is to be found when strength-stress distributed is inverse Weibull random variables with unknown scale parameter and known shape parameter. Six estimation methods (Maximum likelihood, Moment, Least Square, Weighted Least Square, Regression and Percentile) are used to estimate reliability. There is a comparison between six different estimation methods by the simulation study by MATLAB 2016, using two statistical criteria Mean square error and Mean Absolute Percentage Error, where it is found that best estimator between the six estimators is Maximum likelihood estimation method.
This study dedicates to provide an information of shell model calculations, limited to fp-shell with an accuracy and applicability. The estimations depend on the evaluation of Hamiltoian’s eigenvalues, that’s compatible with positive parity of energy levels up to (10MeV) for most isotopes of Ca, and the Hamiltonian eigenvectors transition strength probability and inelastic electron-nucleus scattering. The Hamiltonian is effective in the regions where we have experimented. The known experimental data of the same were confirmed and proposed a new nuclear level for others.
The calculations are done with the help of OXBASH code. The results show good agreement with experimental energy states
... Show MoreBackground: Manuka honey (MH) is a mono-floral honey derived from the Manuka tree (Leptospermum scoparium). MH is a highly recognized for its non-peroxide antibacterial activities, which are mostly related to its unique methylglyoxal content (MGO) in MH. The beneficial phytochemicals in MH is directly related to their favorable health effects, which include wound healing, anticancer, antioxidant, and anti-inflammatory properties. Aims: The purpose of this study was to evaluate the effect of MH on pro-inflammatory cytokines (IL-8 and TNF-α) in patients with gingivitis and compare it with chlorhexidine (CHX) and distilled water (DW). Materials and Methods: This study was a randomized, double blinded, and parallel clinical trial. Forty-fiv
... Show MoreIn this article, the notions are introduced by using soft ideal and soft semi-open sets, which are - - - -closed sets " -closed" where many of the properties of these sets are clarified. Some games by using soft- -semi, soft separation axioms: like ( 0 ( 0 Using many figures and proposition to study the relationships among these kinds of games with some examples are explained.
Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.
Breast cancer is the second deadliest disease infected women worldwide. For this
reason the early detection is one of the most essential stop to overcomeit dependingon
automatic devices like artificial intelligent. Medical applications of machine learning
algorithmsare mostly based on their ability to handle classification problems,
including classifications of illnesses or to estimate prognosis. Before machine
learningis applied for diagnosis, it must be trained first. The research methodology
which isdetermines differentofmachine learning algorithms,such as Random tree,
ID3, CART, SMO, C4.5 and Naive Bayesto finds the best training algorithm result.
The contribution of this research is test the data set with mis
The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.