A microbubble air flotation technique was used to remove chromium ions from simulated wastewater (e.g. water used for electroplating, textiles, paints and pigments, and tanning leather). Experimental parameters were investigated to analyze the flotation process and determine the removal efficiency. These parameters included the location of the sampling port from the bottom of the column, where the diffuser is located to the top of flotation column (30, 60, and 90 cm), the type of surfactant (anionic, SDS, or cationic, CTAB) and its concentration (5, 10, 15, and 20 mg/L), the pH of the initial solution (3, 5, 7, 9, and 11), the initial contaminant concentration (10, 20, 30, and 40 mg/L), the gas flow rate (0.1, 0.2, 0.3, and 0.5 L/min), and the contact time (5, 10, 15, 20, 25, 30, and 35 min). The experimental results revealed that the highest removal efficiency (95%) was achieved in 20 min with a pH of 7, a flow rate of air 0.5 L/min, an SDS surfactant concentration of 15 mg/L, and a pollutant concentration of 30 mg/L at a sampling port height of 30 cm. The use of microbubbles in comparison to normal bubbles, resulted in a 56% improvement of the removal efficiency. The flotation process follows a first-order kinetics.
The influence of adding metal foam fins on the heat transfer characteristics of an air to water double pipe heat exchanger is numerically investigated. The hot fluid is water which flows in the inner cylinder whereas the cold fluid is air which circulates in the annular gap in parallel flow with water. Ten fins of metal foam (Porosity = 0.93), are added in the gap between the two cylinder, and distributed periodically with the axial distance. Finite volume method is used to solve the governing equations in porous and non-porous regions. The numerical investigations cover three values for Reynolds number (1000 ,1500, 2000), and Darcy number (1 x10-1, 1 x10-2, 1x10-3). The comparison betwee
... Show MoreA cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
The penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show More
This present work adopts the analytic and descriptive methodology to recognize and analyze the major challenges faced by the Iraqi government. The study focuses on the press and national partiers’ cabipility of changing and unifying the opinions of the public in a way that serves the Iraqi interest, taking into account the fact that the press is the fourth authority after the three major authorities, (Executive, Legislation and Judicial). The researcher has concluded that the Iraqi press and parties initiated a national front with the Iraqi people against the government’s signature of the treaty of (1930). The national front illustrated that signing the treaty strengthens the authority of the British occupation u
... Show More