This investigation aims to explore the potential of waterworks sludge (WS), low-cost byproduct of water treatment processes, as a sorbent for removing Congo Red (CR) dyes. This will be achieved by precipitating nano-sized (MgAl-LDH)-layered double hydroxide onto the surface of the sludge. The efficiency of utilizing MgAl-LDH to modify waterworks sludge (MWS) for use in permeable reactive barrier technology was confirmed through analysis with Fourier transform infrared and X-ray diffraction. The isotherm model was employed to elucidate the adsorption mechanisms involved in the process. Furthermore, the COMSOL model was utilized to establish a continuous testing model for the analysis of contaminant transport under diverse conditions. A strong correlation was indicated, with a coefficient of determination (R2) ≥ 0.97, when the model's predictions were compared to experimental values, indicating the accuracy of the model. Continuous transport exhibited earlier breakthrough points when the bed depth decreased and the initial concentration and flow rate increased.
Multilateral wells require a sophisticated type of well model to be applied in reservoir simulators to represent them. The model must be able to determine the flow rate of each fluid and the pressure throughout the well. The production rate calculations are very important because they give an indication about some main issues associated with multi-lateral wells such as one branch may produce water or gas before others, no production rate from one branch, and selecting the best location of a new branch for development process easily.  
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThis paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreNowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreAn adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show MoreAs a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand
... Show MoreSecond language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences
... Show More