Efficient management of treated sewage effluents protects the environment and reuse of municipal, industrial, agricultural and recreational as compensation for water shortages as a second source of water. This study was conducted to investigate the overall performance and evaluate the effluent quality from Al- Rustamiya sewage treatment plant (STP), Baghdad, Iraq by determining the effluent quality index (EQI). This assessment included daily records of major influent and effluent sewage parameters that were obtained from the municipal sewage plant laboratory recorded from January 2011 to December 2018. The result showed that the treated sewage effluent quality from STP was within the Iraqi quality standards (IQS) for disposal and t
... Show MoreThis paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreThis paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi
raisin on mice in comparison with negative (phosphate buffer saline (PBS) and positive Mitomycin-C (MMC) controls. Moreover, the effect on fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) was also measured. The effect of the extracted samples were measured by employing cytogenetic analysis which included (the mitotic index (MI), chromosomal aberrations (CAs) and micronucleus (MN)) parameters. Results showed that significant increase in MI and significant reduction in both CAs and MN percentage were seen after treatment with both alcoholic and water extracts of the two raisins and alcoholic extracts was more effective than water extracts. On the other hand both the gold and black raisin enhanced the levels of the
... Show MoreThis study sought to determine the impact of spreading the culture of quality in improving the quality of tourism service in some hotels in Erbil governorate. The theme of excellence in providing service and attention to it has become the concern of most organizations in general and tourism service organizations in particular. Tourists try to establish the mental status of customers about their tourism organizations had to pay attention to the quality of service provided to the customer and work to develop them to the advanced stages of satisfaction and happiness of customers and this will certainly positively affect the improvement of service in the tourism sector, Of the research variables were examined statistically by distrib
... Show More<span lang="EN-US">We are living in the 21<sup>st</sup> century, an era of acquiring necessity in one click. As we, all know that technology is continuously reviving to stay ahead of advancements taking place in this world of making things easier for mankind. Technology has been putting his part in introducing different projects as we have used the field programmable gate arrays (FPGAs) development board of low cost and programmable logic done by the new evolvable cyclone software is optimized for specific energy based on Altera Cyclone II (EP2C5T144) through which we can control the speed of any electronic device or any Motor Control IP product targeted for the fan and pump. Altera Cyclone FPGAs’ is a board thro
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the