Greywater is a possible water source that can be improved for meeting the quality required for irrigation. Treatment of greywater can range from uncomplicated coarse filtration to advanced biological treatment. This article presents a simple design of a small scale greywater treatment plant, which is a series of physical and natural processes including screening, aeration, sedimentation, and filtration using granular activated carbon filter and differentiates its performance with sand filter. The performance of these units with the dual filter media of (activated carbon with sand) in treatment of greywater from Iraqi house in Baghdad city during 2019 and that collected from several points including washbasins, kitchen sink, bathrooms, and laundry, was recorded in terms of removal efficiency of particular pollutants like Turbidity 94%, chemical oxygen demand (COD) 93%, and oil 91%. Dual filter was the most effective filter for decreasing these pollutants, while sand indicates the lowest removal efficiency. In general, granular activated carbon media seemed to be the most proper medium to improve greywater quality for reaching the quality of irrigation within the terms of organic matter decrease. Accordingly, this technology may be reliable for greywater treatment in a residential area.
Biologically active natural compounds are molecules produced by plants or plant-related microbes, such as endophytes. Many of these metabolites have a wide range of antimicrobial activities and other pharmaceutical properties. This study aimed to evaluate (in vitro) the antifungal activities of the secondary metabolites obtained from Paecilomyces sp. against the pathogenic fungus Rhizoctonia solani. The endophytic fungus Paecilomyces was isolated from Moringa oleifera leaves and cultured on potato dextrose broth for the production of the fungal metabolites. The activity of Paecilomyces filtrate against the radial growth of Rhizoctonia solani was tested by mixing the filtrate with potato dextrose agar medium at concentrations of 15%,
... Show MoreThe research aims to examine the evaluation of educational quality management and the ways to improve it in the College of Education for Women at the University of Baghdad from the point of view of the academic staff. The research community consisted of (288) participants comprising all members of the academic staff in the College of Education for Women at the University of Baghdad for the academic year (2019-2020). As for the questionnaire, it was distributed to the academic staff of the scientific departments according to their affiliation for the purpose of identifying the availability of the requirements of the quality of the teaching service provided to them by the educational institution. The researcher adopted a questionnaire deve
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreIn this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s
Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th
he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More