This research discusses application Artificial Neural Network (ANN) and Geographical InformationSystem (GIS) models on water quality of Diyala River using Water Quality Index (WQI). Fourteen water parameterswere used for estimating WQI: pH, Temperature, Dissolved Oxygen, Orthophosphate, Nitrate, Calcium, Magnesium,Total Hardness, Sodium, Sulphate, Chloride, Total Dissolved Solids, Electrical Conductivity and Total Alkalinity.These parameters were provided from the Water Resources Ministryfrom seven stations along the river for the period2011 to 2016. The results of WQI analysis revealed that Diyala River is good to poor at the north of Diyala provincewhile it is poor to very polluted at the south of Baghdad City. The selected parameters were subjected to Kruskal-Wallis test for detecting factors contributing to the degradation of water quality and for eliminating independentvariables that exhibit the highest contribution in p-value. The analysis of results revealed that ANN model was goodin predicting the WQI. The confusion matrix for Artificial Neural Model (NNM) gave almost 96% for training, 85.7%for testing and 100% for holdout. In relation to GIS, six color maps of the river have been constructed to give clearimages of the water quality along the river (PDF) Application of Artificial Neural Network and Geographical Information System Models to Predict and Evaluate the Quality of Diyala River Water, Iraq. Available from: https://www.researchgate.net/publication/346028558_Application_of_Artificial_Neural_Network_and_Geographical_Information_System_Models_to_Predict_and_Evaluate_the_Quality_of_Diyala_River_Water_Iraq [accessed Apr 07 2023].
Water harvesting techniques developed globally during the last decades with highly increasing water crisis and climate changes. The Yeoman keyline method was spread widely with increased use for sustainable permaculture development. The main aim of the current study is to analyze and solve the siltation problem in Dwerige weir and to develop water resources in the basin area. The remote sensing data, field surveying, and hydrology are used together to build a new geotechnical approach. The results show that a huge siltation quantity was not considered in the weir design studies, which were represented by sand sheet materials and eroded soils washed by flooding and entering the weir reservoir through four main channels. The t
... Show MoreMilling process is a common machining operation that is used in the manufacturing of complex surfaces. Machining-induced residual stresses (RS) have a great impact on the performance of machined components and the surface quality in face milling operations with parameter cutting. The properties of engineering material as well as structural components, specifically fatigue life, deformation, impact resistance, corrosion resistance, and brittle fracture, can all be significantly influenced by residual stresses. Accordingly, controlling the distribution of residual stresses is indeed important to protect the piece and avoid failure. Most of the previous works inspected the material properties, tool parameters, or cutting parameters, bu
... Show MoreSamarium ions (Sm +3), a rare-earth element, have a significant optical emission within the visible spectrum. PMMA samples, mixed with different ratios of SmCl3.6H2O, were prepared via the casting method. The composite was tested using UV-visible, photoluminescence and thermogravimetric analysis (TGA). The FTIR spectrometry of PMMA samples showed some changes, including variation in band intensity, location, and width. Mixed with samarium decreases the intensity of the CO and CH2 stretching bands and band position. A new band appeared corresponding to ionic bonds between samarium cations with negative branches in the polymer. These variations indicate complex links between the Sm +3 ion and oxygen in the ether group. The optical absorption
... Show MoreOver application courier company (DHL) to keep the quality of service to achieve customer satisfaction the adoption of precedence delivery time - A prospective study))
Become attention to quality is a global phenomenon, and I took organizations and governments around the world attaches special attention, but we can say that quality has become the first function for many organizations, and has become a management philosophy
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreAA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThis work aimed to design, construct and operate a new laboratory scale water filtration system. This system was used to examine the efficiency of two ceramic filter discs as a medium for water filtration. These filters were made from two different ceramic mixtures of local red clay, sawdust, and water. The filtration system was designed with two rotating interfered modules of these filters. Rotating these modules generates shear force between water and the surfaces of filter discs of the filtration modules that works to reduce thickness of layer of rejected materials on the filters surfaces. Each module consists of seven filtration units and each unit consists of two ceramic filter discs. The average measured hy
... Show More