In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
This paper presents the study and analysis, analytically and numerical of circular cylindrical shell pipe model, under variable loads, transmit fluid at the high velocity state (fresh water). The analytical analysis depended on the energy observation principle (Hamilton Principle), where divided all energy in the model to three parts , strain energy, kinetic energy and transmitted energy between flow and solid (kinetic to potential energy). Also derive all important equations for this state and approach to final equation of motion, free and force vibration also derived. the relations between the displacement of model function of velocity of flow, length of model, pipe thickness, density of flowed with location coordinate x-axis and angle
... Show MoreBACKGROUND: Volar Barton’s fracture is a shearing mechanism of injury that results in fracture and subluxation of distal end radius in which volar rim of the distal radius is displaced with hand and carpus. Open reduction and volar plate fixation ensure more stable change of displacement, preservation of reduction, and early mobilization. AIM: This study aims to assess the functional and radiological outcome results of volar Barton’s fracture treated by volar buttress plate using the demerit points system of Gartland and Werley. PATIENTS AND METHODS: This study is a prospective descriptive observational study on 32 patients who were treated with ORIF by volar buttress plate for isolated volar Barton’s fractures between Fe
... Show MoreAssociation rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.
The variety of clean energy sources has risen, involving many resources, although their fundamental principles remain consistent in terms of energy generation and pollution reduction. The using of hydropower system for energy production also has a dynamic impact in which it utilizes to harness the water for the purpose of energy production. As it is important to overcome the problem of accidents in the highway and rural areas in the case of server rainfall and flood by implementation a smart system that used for energy production. This paper aims to develop a controlled hydropower system installed in the drainage sinks allocated in highway roads used for producing. The proposed system consists of storage unit represented by pipes used for t
... Show MoreThis research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to bein
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreThe goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show More