Background: Large amounts of oily wastewater and its derivatives are discharged annually from several industries to the environment. Objective: The present study aims to investigate the ability to remove oil content and turbidity from real oily wastewater discharged from the wet oil's unit (West Qurna 1-Crude Oil Location/ Basra-Iraq) by using an innovated electrocoagulation reactor containing concentric aluminum tubes in a monopolar mode. Methods: The influences of the operational variables (current density (1.77-7.07 mA/cm2) and electrolysis time (10-40 min)) were studied using response surface methodology (RSM) and Minitab-17 statistical program. The agitation speed was taken as 200 rpm. Energy and electrodes consumption had been studi
... Show MoreThis study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i
... Show MoreThe acidity of spent lubricant was treated using sodium hydroxide solution. The effect of three variables on the treatment have been studied . These are mixing time rangingfrom 5-35 minutes, NaOH to lubricant weight ratio ranging from 0.25-1.25 and weight percentage of NaOH ranging from 2-6 % .
The experimental design of Box-Wilson method is adopted to find a useful relationship between the three controllable variables and the lowering in the acidity of the spent lubricant. Then the effective variables and interactions are identified using the statistical analysis(F-test) of three variable fractional design. The mathematical model is well represented by a second order polynomial.
By
... Show MoreShaky Baghdad heavy crude oil 22 API is processed by distillation and solvent extraction. The purpose of distillation is to separate the light distillates (light fractions) which represent 35% of heavy crude oil, and to obtain the reduced crude oil. The heavy residue (9 API) is extracted with Iraqi light naphtha to get the deasphaltened oil (DAO), the extraction carried out with temperature range of 20-75 oC, solvent to oil ratio 5-15:1(ml:g) and a mixing time of 15 minutes. In general, results show that API of DAO increased twice the API of reduced crude oil while sulfur and metals content decreased 20% and 50% respectively. Deasphaltened oil produced from various operating conditions blended with the
... Show MoreThis study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Ep
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSignificant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show MoreSeveral Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show More