Preferred Language
Articles
/
ijcpe-548
Performance of Subsurface Flow Constructed Wetland Systems in the Treatment of Al-Rustumia Municipal Wastewater using Continuous Loading Feed
...Show More Authors

This study aimed at comparing the performance of vertical, horizontal and hybrid subsurface flow systems in secondary treatment for the effluent wastewater from the primary basins at Al-Rustumia wastewater treatment plant, Baghdad, Iraq. The treatments were monitored for six weeks while the testsduration were from 4 to 12 September 2018 under continuous wastewater feeding for chemical oxygen demand (COD), total suspended solid (TSS),ammonia-nitrogen(NH4-N) and phosphate (PO4-P) in comparison with FAO and USEPA standards for effluent discharge to evaluate the suitability of treated water for irrigation purposes. Among the systems planted with Phragmites Australia, the hybrid subsurface flow system which consisted of vertical unit followed by horizontal one, considerably removed the pollutants more efficiently than the single operated systems. The planted hybrid subsurface flow wetland system was achieved the highest removal with a mean removal rate of COD,TSS, NH4-N, and PO4-Pat 99.3, 83.2,67.4 and 53% respectively and these percentages were decreased in the other systems. The results proved that the planted vertical subsurface flow unit can be removed the COD, TSS, NH4-N and PO4-Pwith values of 93, 71.1, 43.3 and 30.7%, respectively while the achieved removals by horizontal subsurface flow unit of 99, 74.3, 54.5 and 20.3%, respectively. The planted horizontal subsurface flow wetland, however, showed a good efficacy for all parameters in the treatment process except for PO4-P when it is compared with vertical system, however, there is a clear increase in the NO3-N effluent concentration for all treatment units.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Problem of International Finance and Efficiency of Local Savings in Financing for Development in Algeria: Standard study for the period (1970-2014)
...Show More Authors

      The aim of this study is to investigate the nature of the relationship between domestic savings and domestic investment, or rather the efficiency of domestic savings in financing development in Algeria, in order to explain this relationship, identify the challenges to investment, and finance and accelerate economic growth. The economic measurement methodology has estimated the relationship between the savings rate and the local investment rate in the Algerian economy. We have annual data for the period 1970-2014. One of the most important conclusions is that there is no relationship between savings and investment, nor even an integration between them. To illustrate this, the use of some statistical tools, a

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 26 2016
Journal Name
E-marefa
Evolution level of Iraqi journalists residing in Jordan of covering the political and economic reforms in Iraq by the Iraqi satellite TV stations
...Show More Authors

هدفت الدراسة إلى التعرف على مستوى تقييم الإعلاميين العراقيين المقيمين في الأردن لتغطية الإصلاحات السياسية و الاقتصادية في العراق من قبل الفضائيات العراقية. و هدفت كذلك إلى التعرف على الف

View Publication
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Role of Some Inflammatory Markers (IL-6 and CRP) in the Pathogenesis of Acute Coronary Syndrome in Iraqi CCU for Heart Diseases
...Show More Authors

In this work an enzyme linked immunosorbent assay (ELISA) technique has been used for detection of some inflammatory markers in serum of acute coronary syndrome (ACS)-Patients Admitted to the cardiac care unit (CCU) of Iraqi Centre For Heart Diseases and Ibn AlNafees Teaching Hospital. The present method includes quantitative measurement of interleukine-6 (IL-6) and C-reactive protein (CRP), as their increase during symptoms may be responsible for identifying the mechanism of myocardial damag, in addition to their best performance than other quantitative tests perhaps due to their association with atherosclerotic process that belongs to the endothelial dysfunction. Aim of this study is to estimate the prevalence and correlation of IL-6 w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Evaluation of the level of Some Heavy Metals in Tobacco of Domestic and Imported Cigarette Brands Used in Iraq
...Show More Authors

Smoking-related diseases can be attributed to the inhalation of many different toxins, including heavy metals, which have a host of harmful health effects. The primary objective of this study was to determine whether local and imported cigarette brands used in Iraq , have they elevated levels of metals or not .Three metals Lead (Pb) , Cadmium (Cd) and Chromium(Cr) were determined in tobacco of seventeen brands of imported cigarettes commonly available in Iraq and three Iraqi domestic cigarettes , which were randomly taken from retail market in Baghdad by using flame atomic absorption spectrometry. The produced data of imported and local cigarette brands were discussed and compared together and with studies from elsewhere .The result

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Determination of the Optimum Conditions in Evaluation of Kiwi Juice as Green Corrosion Inhibitor of Steel in Hydrochloric Acid
...Show More Authors

The corrosion protection of low carbon steel in 2.5 M HCl solution by kiwi juice was studied at different temperatures and immersion times by weight loss technique. To study the determination of the optimum conditions from statistical design in evaluation of a corrosion inhibitor, three variables, were considered as the most dominant variables. These variables are: temperature, inhibitor concentration (extracted kiwi juice) and immersion time at static conditions.

These three variables are manipulated through the experimental work using central composite rotatable Box – Wilson Experimental Design (BWED) where second order polynomial model was proposed to correlate the studied variables with the corrosion rate o

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref