The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calibrated model were very close tothe actual concentrations measured in field at different sampling points for different sampling days.Keywords: Chlorine decay, Water quality, Water distribution network, EPANET softwar (PDF) Simulation of Chlorine Decay in Al-Gukook Water Distribution Networks Using EPANET. Available from: https://www.researchgate.net/publication/328201790_Simulation_of_Chlorine_Decay_in_Al-Gukook_Water_Distribution_Networks_Using_EPANET [accessed Apr 07 2023].
In this work, the theoretical study for designing of dielectric mirrors of high reflectance in the visible region of electromagnetic spectrum between wavelength of 400-700 nm is presented, and searching on the performance properties of the design, like there reflectance as a function to the wavelength, as beam incident in a normal form, for the materials of neglected absorbance, and scattering, in the form of thin film deposition, which are deposited on glass substrate, and by using matrix system in the study, which are used as computer simulation in MATLAB code. The materials which are used in this study are represented by ( AlAs ), (TiO2 ),( SiC ), and (Si3N4 ), which used in the designing mirrors alter
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreWith the spread use of internet, especially the web of social media, an unusual quantity of information is found that includes a number of study fields such as psychology, entertainment, sociology, business, news, politics, and other cultural fields of nations. Data mining methodologies that deal with social media allows producing enjoyable scene on the human behaviour and interaction. This paper demonstrates the application and precision of sentiment analysis using traditional feedforward and two of recurrent neural networks (gated recurrent unit (GRU) and long short term memory (LSTM)) to find the differences between them. In order to test the system’s performance, a set of tests is applied on two public datasets. The firs
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreIn the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show
... Show MoreThe impact of decorating Fe, Ru, Rh, and Ir metals upon the sensing capability of a gallium nitride nanotube (GaNNT) in detecting chlorine trifluoride (CT) was scrutinized using the density functionals B3LYP and B97D. The interaction of the pristine GaNNT with CT was a physical adsorption with the sensing response (SR) of approximately 6.9. After decorating the above-mentioned metals on the GaNNT, adsorption energy of CT changed from −5.8 to −18.6, −18.9, −19.4, and −20.1 kcal/mol by decorating the Fe, Ru, Rh, and Ir metals into the GaNNT surface, respectively. Also, the corresponding SR dramatically increased to 39.6, 52.3, 63.8, and 106.6. This shows that the sensitivity of the metal-decorated GaNNT (metal@GaNNT) increased by in
... Show MoreThe main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreOften phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show More