Tau-P linear noise attenuation filter (TPLNA) was applied on the 3D seismic data of Al-Samawah area south west of Iraq with the aim of attenuating linear noise. TPLNA transforms the data from time domain to tau-p domain in order to increase signal to noise ratio. Applying TPLNA produced very good results considering the 3D data that usually have a large amount of linear noise from different sources and in different azimuths and directions. This processing is very important in later interpretation due to the fact that the signal was covered by different kinds of noise in which the linear noise take a large part.
A new mode of methodology was adopted in the assay of PM- HCL based on the use of water crystal gel bead made of poly acrylic acid in which the gel beads were left to absorbe persulphate solution that is necessary for the oxidation of PM- HCL in aqua media . The water crystal act as a reserviour for S2O82- . Optimum parameters were studied giving to specify the chemical and physical parameters. Two line manifold was used .The flow rates of 1.5 and 1.2 ml.min-1 was used , 3 gel beads , 120 μL sample volume , a linear dynamic range extend from 0.01- 18 mmol.L-1. A correlation coefficient (r) of 0.9991while the percentage linearity (r2%) of 99.82% with R.S.D% at 8 mmol.L-1 promethazine-HCl is less than 0.5% (ten replicates) and a detection
... Show MoreThe approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreThis study is aimed to use the aerobic packed bed in biotreatment of the wastewater which is discharge from AL-KARAMA teaching hospital in Baghdad. The performance of packed-bed treatment method was examined for elimination of the organic compounds from wastewater under aerobic conditions. In this research different parameters were studied. They were: inoculums concentration, circulation rate of wastewater through the bed, packing type and the temperature. Results showed that the system efficiently removed about 82% of the chemical oxygen demand (COD) and 80% of the Biological oxygen demand (BOD). Percent reduction in turbidity was about 92% and reduction in nitrate concentration was about 87%. It was found that best performance of the pack
... Show MoreA study was performed to evaluate heavy metals removal from sewage sludge using lime. The processes of stabilization using alkaline chemicals operating on a simple principle of raising pH to 12 or higher, with sufficient mixing and suitable contact time to ensure that immobilization can reduce heavy metals. A 0.157 m3 tank was designed to treat Al-Rustemeyia wastewater treatment plant sludge. Characteristics of raw sludge were examined through two parameters: pH and heavy metal analysis. Different lime doses of (0- 25) g CaO/100 g sludge were mixed manually with raw sludge in a rotating drum. The samples were analyzed two hours after mixing. pH and heavy metals results were compared with EPA and National Iraqi Stand
... Show MoreWe have found through research , that administrative institutions on the outskirts of Kufa and their management is not as important as administrative institution in place that were associated with it and subject to its control ,as it often was express power , or poor ( if true ) expression , directors of the center for the suburbs , as it became clear to our diversity of those administrative institutions and prominent role in the interest of the affairs of the people and society in all aspects of life , and are the functions and different staff from the highest authority the suburbs represented by house of representatives ( the workers ) ,then workers abscess and Al-dhaqan and not to mention for other jobs came the actions of Bhaltsier a
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show More