Preferred Language
Articles
/
ijs-1671
Bioremediation of Petroleum Polluted Soils using Consortium Bacteria
...Show More Authors

      This study was carried out to isolate opportunistic hydrocarbons oil-degrading bacteria and develop a consortium or a mixture of bacteria with high biodegradation capabilities which can be used in biological treatment units of the contaminated water before release. The biological processes in general are environmentally friendly and cost effective, as they are easy to design and apply; as such they are more appropriate to the public.

    The location of the study was in Al-Dora refinery sludge holes area. The samples were collected for three seasons (winter, spring and summer) each consisted of three months.  The sludge samples were analyzed for various physical and chemical parameters. Temperature values of the sludge were at maximum in summer season, reaching 32ËšC, whereas they were at minimum in winter (24 ËšC). The values of sludge pH were at maximum in summer (9.70) and minimum in winter (9.20). Turbidity levels were 382 NTU in spring and 353 NUT in winter. Biological oxygen demand (BOD5) was at maximum in summer (760) and (690 mg/l) in winter. The maximum dissolved oxygen (DO) value of 5.20 mg/l was recorded in winter, while the minimum was 3.80 mg/l recorded in summer. The maximum electrical conductivity (EC) was 17130 μs/cm recorded in summer, while the minimum was 16150 μs/cm recorded in winter. The maximum total dissolved solids (TDS) values were 10335 mg/l recorded in summer, while the minimum (10015 mg/l) was recorded in winter. The maximum total petroleum hydrocarbon (TPH) value (431 mg/l) was recorded in summer, while the minimum (367 mg/l) was recorded in spring. Finally, the maximum salinity value (9.90%) was recorded in spring, while the minimum (9.30%) was recorded in winter. Also, hydrocarbon compounds in sludge samples were measured using Gas Chromatography - Mass Spectrometry (GC-MS), and the result showed that they were composed of 31 hydrocarbon compounds.In the present work, nineteen sludge degrading bacterial strains were isolated from the soil near Al-Dora refinery hole by primary and secondary screenings using a modified mineral salt medium supplemented with 1% (v/v) sludge as a carbon source. The most efficient two sludge degraded isolates identified by VITIK 2 compact were Kocuria rosea and Bacillus amyloliquefaciens. The tow isolates and there mixture showed best growth at 30°C for 12 days, as shown by the measurement of the optical density of the liquid culture and the final oil concentration by spectrophotometer.

     The bacterial isolates in liquid media with 2% (v/v) sludge showed best growth and the maximum biodegradation percentage after 12-day incubation period, as determined by gas chromatographic (GC). The degradation values were 68.9, 93.8 and 95.5% for Bacillus amyloliquefaciens, Kocuria rosea and the mixture of the tow isolates, respectively. In optimum conditions of pH 7, 40°C, 12 days incubation, the mixed bacterial consortium showed maximum sludge degradation.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment, And Sustainability: Tmrees23fr
Hyperspectral pansharpening improvement using MNF transformation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Outdoor Scene Classification Using Multiple SVM
...Show More Authors

This paper presents a hierarchical two-stage outdoor scene classification method using multi-classes of Support Vector Machine (SVM). In this proposed method, the gist feature of all the images in the database is extracted first to obtain the feature vectors. The image of database is classified into eight outdoor scenes classes, four manmade scenes and four natural scenes. Second, a hierarchical classification is applied, where the first stage classifies all manmade scene classes against all natural scene classes, while the second stage of a hierarchical classification classifies the outputs of first stage into either one of the four manmade scene classes or natural scene classes. Binary SVM and multi-classes SVMs are employed in the fir

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Feature Extraction Using Remote Sensing Images
...Show More Authors

Feature extraction provide a quick process for extracting object from remote sensing data (images) saving time to urban planner or GIS user from digitizing hundreds of time by hand. In the present work manual, rule based, and classification methods have been applied. And using an object- based approach to classify imagery. From the result, we obtained that each method is suitable for extraction depending on the properties of the object, for example, manual method is convenient for object, which is clear, and have sufficient area, also choosing scale and merge level have significant effect on the classification process and the accuracy of object extraction. Also from the results the rule-based method is more suitable method for extracting

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Remove Reflection Using Wavelet transformation Estimation
...Show More Authors

     Improving the performance of visual computing systems is achieved by removing unwanted reflections from a picture captured in front of a glass. Reflection and transmission layers are superimposed in a linear form at the reflected photographs. Decomposing an image into these layers is often a difficult task. Plentiful classical separation methods are available in the literature which either works on a single image or requires multiple images. The major step in reflection removal is the detection of reflection and background edges. Separation of the background and reflection layers is depended on edge categorization results. In this paper a wavelet transform is used as a prior estimation of background edges to sepa

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref