This study is aimed to use the aerobic packed bed in biotreatment of the wastewater which is discharge from AL-KARAMA teaching hospital in Baghdad. The performance of packed-bed treatment method was examined for elimination of the organic compounds from wastewater under aerobic conditions. In this research different parameters were studied. They were: inoculums concentration, circulation rate of wastewater through the bed, packing type and the temperature. Results showed that the system efficiently removed about 82% of the chemical oxygen demand (COD) and 80% of the Biological oxygen demand (BOD). Percent reduction in turbidity was about 92% and reduction in nitrate concentration was about 87%. It was found that best performance of the packed bed method was obtained at temperature of 37 oC, circulation rate of 10 L/min and inoculums concentration of 3%.
Poetry occupied the Arabs in a unique position, especially in the era; ignorant, Umayyad and Abbasid, in addition to its literary and aesthetic dimensions, it is at the forefront of tools and media at the time. The poet appointed society and poetry Diwan Arabs records their exploits and virtues and their valor in the wars... The Prophet Muhammad () realized the importance of poetry, so he took advantage of him in the libel for his Islamic call. In the Umayyad and Abbasid states, poetry had a clear role in social, literary and political life, as the ruling authority used its influence on many poets to be media to support its political theory, by praising the Caliph and his aides, and exposing those who dissented and opposing them. The
... Show MoreVarious literary studies have investigated the psychological, social and cultural effects of traumatic events. They give voice to traumatised victims and enable them to convey and confront their traumas. However, these studies present a one-sided view, concentrating largely on the presentation of trauma in the industrial societies of the Western world. Recently, increasing attention has been devoted to identifying and depicting the forms and types of trauma that have been experienced in marginalised and neglected societies, such as the Iraqi society. Iraq has witnessed the unexpected fall of a brutal dictatorship, Western invasion and an unprecedented rise of sectarian discourses. This extreme violence has deeply affected many aspec
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators