The assessment of a river water’ quality is an essential procedure of monitor programs and isused to collect basic environmental data. The management of integrated water resources in asustainable method is also necessary to allow future generations to meet their water needs. Themain objective of this research is to assess the effect of the Diyala River on Tigris River waterquality using Geographic Information System (GIS) technique. Water samples have beencollected monthly from November 2017 to April 2018 from four selected locations in Tigris andDiyala Rivers using the grab sampling method. Fourteen parameters were studied which areTurbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, TotalDissolved Solids, Total Hardness, Calcium, Magnesium, Chloride, Sulphate, Phosphate, Sodium,and Total Alkalinity. The results of GIS maps showed that the water quality of the Tigris Rivernearly affected by the water quality of the Diyala River within the locations selected. The mapsalso reveal that in March and April 2018 the quality of surface water got a sudden peakcompared with the other months. This is due to the increase in both the parameter of Turbidityand Total Dissolved Solids. (PDF) The Effect of Diyala River Water Quality on the Quality of Tigris River Water using GIS Mapping. Available from: https://www.researchgate.net/publication/336272200_The_Effect_of_Diyala_River_Water_Quality_on_the_Quality_of_Tigris_River_Water_using_GIS_Mapping [accessed Apr 07 2023].
The penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreThe Local manufacturing scanning gamma system designed in Tuwaitha site for nondestructive assay method of radioactive waste drums, where it consist of two main parts with their belongings for controlling the of detector and drum movements up-down and rotation respectively. The volume of the used drum is 220 L with 85 cm height. The drum filled with Portland cement. Six cylindrical holes were made within cement drum and distributed in radial arrangement.The152Eu source inserted in these holes individually, to measure the average angular count rate of gamma radiation. The full energy efficiency value for geometry of drum and detector is computed for thirteen photo peaks. The average efficiency represented by the curve of these peaks indic
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show More