In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
Removal of heavy metal ions such as, cadmium ion (Cd 2+) and lead ion (Pb 2+) from aqueous solution onto Eichhornia (water hyacinth) activated carbon (EAC) by physiochemical activation with potassium hydroxide (KOH) and carbon dioxide (CO2) as the activating agents were investigated. The Eichhornia activated carbon was characterized by Brunauer Emmett Teller (BET), Fourier Transform Infrared spectroscopy (FTIR), and Scanning Electron Microscopy (SEM) techniques. Whereas, the effect of adsorbent dosage, contact time of pH, and metal ion concentration on the adsorption process have been investigated using the batch process t
This study concerns the removal of a trihydrate antibiotic (Amoxicillin) from synthetically contaminated water by adsorption on modified bentonite. The bentonite was modified using hexadecyl trimethyl ammonium bromide (HTAB), which turned it from a hydrophilic to a hydrophobic material. The effects of different parameters were studied in batch experiments. These parameters were contact time, solution pH, agitation speed, initial concentration (C0) of the contaminant, and adsorbent dosage. Maximum removal of amoxicillin (93 %) was achieved at contact time = 240 min, pH = 10, agitation speed = 200 rpm, initial concentration = 30 ppm, and adsorbent dosage = 3 g bentonite per 1L of pollutant solution. The characterization of the adsorbent, modi
... Show MoreThis study assessed the quality of hand-dug drinking water sources in Eku and its environs at Eku I, Samagidi, Eku 2, and Okuechi, using the weighted arithmetic water quality index method. Water samples collected from hand-dug wells at these locations returned values for analyzed parameters. Temperature 26 – 30(⁰C), dissolved Oxygen (D.O) 5.2-8mg/l, biological oxygen demand (BOD) 5.2-8(mg/l), Electrical Conductivity (EC) 77-119(µS/cm), Total suspended solids were (TSS) 20000-120000(mg/l), pH 5.31-7.09, Phosphates 2-9.2(mg/l), Alkalinity 28-160(mg/l), Turbidity, 0.02 -0.19(NTU) Total coliform 2 -48 (cfu/ml) and fungal count 1-502. Variations in the values of these parameters were only significant for phosphate, alkalinity, and turb
... Show MoreMany people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d
... Show MoreThere is no doubt though all endemic industrial must be accompanied by environmental contamination problem that is closely linked increased industrial activity on the one hand and increase the size of the problem put this industrial waste on the other, and therefore the risk to natural resources and ecosystems as a result of the presence of development projects (especially industrial ones) so it was There must be a sound footing for the sitting of industrial zones and see how their commitment to the appropriate conditions to preserve the environment and enact strict laws to achieve this and prepared well prepared to avoid the numerous errors at the social, economic and technical, environmental and health.
This article aim to estimate the Return Stock Rate of the private banking sector, with two banks, by adopting a Partial Linear Model based on the Arbitrage Pricing Model (APT) theory, using Wavelet and Kernel Smoothers. The results have proved that the wavelet method is the best. Also, the results of the market portfolio impact and inflation rate have proved an adversely effectiveness on the rate of return, and direct impact of the money supply.
The aim of this study was spot light to the possibility of confection between hepatitis C&G viruses in Iraqi patients. The groups was studied included two groups as follow: 1- first group: its (Infected group) the patients of this group have Anti-HCV abs in their serum by using Indirect ELISA technique. 2- second group: its (Control group) the persons of this group have no Anti-HCV abs in their serum by using indirect ELISA technique. The result of this study was observed there was two patients from the first group have Anti-HGVabs in their serum with infection percent 2.70%, also the same result was found in the second group wich mean there was two persons have Anti-HGVabs in their serum with infection percent 8.33% .So when we comparin
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
Wind turbine (WT) is now a major renewable energy resource used in the modern world. One of the most significant technologies that use the wind speed (WS) to generate electric power is the horizontal-axis wind turbine. In order to enhance the output power over the rated WS, the blade pitch angle (BPA) is controlled and adjusted in WT. This paper proposes and compares three different controllers of BPA for a 500-kw WT. A PID controller (PIDC), a fuzzy logic controller (FLC) based on Mamdani and Sugeno fuzzy inference systems (FIS), and a hybrid fuzzy-PID controller (HFPIDC) have been applied and compared. Furthermore, Genetic Algorithm (GA) and Particle swarm optimization (PSO) have been applied and compared in order to identify the optimal
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More