Preferred Language
Articles
/
ijs-1671
Bioremediation of Petroleum Polluted Soils using Consortium Bacteria
...Show More Authors

      This study was carried out to isolate opportunistic hydrocarbons oil-degrading bacteria and develop a consortium or a mixture of bacteria with high biodegradation capabilities which can be used in biological treatment units of the contaminated water before release. The biological processes in general are environmentally friendly and cost effective, as they are easy to design and apply; as such they are more appropriate to the public.

    The location of the study was in Al-Dora refinery sludge holes area. The samples were collected for three seasons (winter, spring and summer) each consisted of three months.  The sludge samples were analyzed for various physical and chemical parameters. Temperature values of the sludge were at maximum in summer season, reaching 32ËšC, whereas they were at minimum in winter (24 ËšC). The values of sludge pH were at maximum in summer (9.70) and minimum in winter (9.20). Turbidity levels were 382 NTU in spring and 353 NUT in winter. Biological oxygen demand (BOD5) was at maximum in summer (760) and (690 mg/l) in winter. The maximum dissolved oxygen (DO) value of 5.20 mg/l was recorded in winter, while the minimum was 3.80 mg/l recorded in summer. The maximum electrical conductivity (EC) was 17130 μs/cm recorded in summer, while the minimum was 16150 μs/cm recorded in winter. The maximum total dissolved solids (TDS) values were 10335 mg/l recorded in summer, while the minimum (10015 mg/l) was recorded in winter. The maximum total petroleum hydrocarbon (TPH) value (431 mg/l) was recorded in summer, while the minimum (367 mg/l) was recorded in spring. Finally, the maximum salinity value (9.90%) was recorded in spring, while the minimum (9.30%) was recorded in winter. Also, hydrocarbon compounds in sludge samples were measured using Gas Chromatography - Mass Spectrometry (GC-MS), and the result showed that they were composed of 31 hydrocarbon compounds.In the present work, nineteen sludge degrading bacterial strains were isolated from the soil near Al-Dora refinery hole by primary and secondary screenings using a modified mineral salt medium supplemented with 1% (v/v) sludge as a carbon source. The most efficient two sludge degraded isolates identified by VITIK 2 compact were Kocuria rosea and Bacillus amyloliquefaciens. The tow isolates and there mixture showed best growth at 30°C for 12 days, as shown by the measurement of the optical density of the liquid culture and the final oil concentration by spectrophotometer.

     The bacterial isolates in liquid media with 2% (v/v) sludge showed best growth and the maximum biodegradation percentage after 12-day incubation period, as determined by gas chromatographic (GC). The degradation values were 68.9, 93.8 and 95.5% for Bacillus amyloliquefaciens, Kocuria rosea and the mixture of the tow isolates, respectively. In optimum conditions of pH 7, 40°C, 12 days incubation, the mixed bacterial consortium showed maximum sludge degradation.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
2017 Annual Conference On New Trends In Information & Communications Technology Applications (ntict)
An efficient color quantization using color histogram
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
2018 1st Annual International Conference On Information And Sciences (aicis)
Speech Emotion Recognition Using Minimum Extracted Features
...Show More Authors

Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF),

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 14 2021
Journal Name
The Open Civil Engineering Journal
Producing Sustainable Concrete using Nano Recycled Glass
...Show More Authors
Background:

Many tools and techniques have been recently adopted to develop construction materials that are less harmful and friendlier to the environment. New products can be achieved through the recycling of waste material. Thus, this study aims to use recycled glass bottles as sustainable materials.

Objective:

Our challenge is to use nano glass powder by the addition or replacement of the weight of the cement for producing concrete with enhanced strength.

Methods:

A nano recycled glass p

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
mRNA Approach Image Encryption Using LUC Algorithm
...Show More Authors

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Plants Leaf Diseases Detection Using Deep Learning
...Show More Authors

     Agriculture improvement is a national economic issue that extremely depends on productivity. The explanation of disease detection in plants plays a significant role in the agriculture field. Accurate prediction of the plant disease can help treat the leaf as early as possible, which controls the economic loss. This paper aims to use the Image processing techniques with Convolutional Neural Network (CNN). It is one of the deep learning techniques to classify and detect plant leaf diseases. A publicly available Plant village dataset was used, which consists of 15 classes, including 12 diseases classes and 3 healthy classes.  The data augmentation techniques have been used. In addition to dropout and weight reg

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Optical Character Recognition Using Active Contour Segmentation
...Show More Authors

Document analysis of images snapped by camera is a growing challenge. These photos are often poor-quality compound images, composed of various objects and text; this makes automatic analysis complicated. OCR is one of the image processing techniques which is used to perform automatic identification of texts. Existing image processing techniques need to manage many parameters in order to clearly recognize the text in such pictures. Segmentation is regarded one of these essential parameters. This paper discusses the accuracy of segmentation process and its effect over the recognition process. According to the proposed method, the images were firstly filtered using the wiener filter then the active contour algorithm could b

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Using Ultraviolet Technique for Well Water Disinfection
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref