In this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respe
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreArabic calligraphy has great importance in the printing designs that are often on the written character-based to perform functional goals and to achieve some of the aesthetic values in design work, has led major developments in the field of computer manufacturing and design software for the design and layout to increase to deal with the programmed character for the purposes of typesetting has confronted this Find the Arab character programmed for the purposes of typesetting for the detection of the most important design interventions that underwent the Arabic letter written to turn it into a programmed image intended for the purposes of the printing and typesetting has been addressed in the context of which the theoretical types of
... Show MoreIn this paper, a statistical analysis compared the pattern of distribution of spending on various goods and services and to identify the main factors that control the rates of spending between the survey of social and economic status of families in Iraq for the year (2007) and the survey of Iraq knowledge net work (IKN) for the year (2011), which were carried out by the Central Bureau of Statistics through the use of factor analysis and cluster analysis, using the ready statistical software package ready (SPSS) to gain access to the results.
Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show MoreMost of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThep resent study was conducted for monitoring of the evaporative cooling tower in methanol production plant using digital computer' visuql Basic computer program was used for the monitoring of the performance of the cooling tower. The structure program consists of sub programs and forms to show all the related variabltes such as temperature, flow rate, pressure ...etc, that affect the cooling tower operation and give alarms and important function informition regarding these variables.