The electrocoagulation process became one of the most important technologies used for water treatment processes in the last few years. It’s the preferred method to remove suspended solids and heavy metals from water for treating drinking water and wastewater from textile, diary, and electroplating factories. This research aims to study the effect of using the electrocoagulation process with aluminum electrodes on the removal efficiency of suspended solids and turbidity presented in raw water and optimizing by the response surface methodology (RSM). The most important variables studied in this research included electrode spacing, the applied voltage, and the operating time of the electrocoagulation process. The samples were taken from the Al Qadisiyiah water treatment plant. The treatment set up was in a batch mode; two parallel plates of aluminum were used as electrodes. Experimental results showed that the maximum removal efficiency of 96% for turbidity and 97% for TSS were obtained at operating time 60 minutes, voltage 30 V, and electrode spacing 1.7cm. Two models for predicting removal efficiency obtained, the first model was for turbidity with a correction factor of 94.7%, and the second one was for the TSS with a correction factor of 94.85%.
Background: Recently, Poly propylene fibers with and without plasma treatment have been used to reinforce heat cure denture base acrylic but, so far some of properties like tensile strength , wettability and wear resistance not evaluated yet, the aim of the study is to clarify the influence of incorporation of treated and untreated fibers on these properties. Materials and methods: Twenty one specimens were fabricated for every tested property(tensile strength, wear resistance and wettability) that classified into three groups(control, untreated poly propylene fibers reinforced specimens and Oxygen plasma treated group)and for each test sevens amples were used(n=7). Tensile strength was tested using Instron universal testing machine, wear
... Show MoreIraq is Suffering nowadays from the criminal triad represented by the fiscal and administrative corruption, money laundering and terrorism, which are intertwined in a very related relations, as each of them support the other . Since the over growth has been one of its characteristics leaving behind a very dangerous negative effects whether it was social , economic or even political impacts . As a result , this trial is now represents a high risk that threatens the present and the future of Iraq . On the political , economic and social level , it is well to mention that the poor direct investment , the increasing rates of poverty , unemployment , inflation as well as the smuggling of goreign currency an
... Show MoreThe clinical spectrum of cutaneous leishmaniasis (CL), an intracellular parasitic pathogen, ranges from a single sore healing to chronic crusty lesions with a manifestation of treatment resistance. The complicated interaction between Leishmania bodies and the early immune response, including innate and adaptive mechanisms, determines the evolution of nodules. This study examined the levels of the chemoattractant interleukin 8 (IL-8), pro-inflammatory nitric oxide (NO), and immunoregulatory macrophage inhibitory factor (MIF) in the serum of subjects recently diagnosed with cutaneous leishmaniasis, in parallel with patients being monitored during consecutive sodium stibogluconate (Pentostam) treatment. A total of 161 serum samples of newly di
... Show MoreAnew Schiff base (NaHL) has been prepared from the reaction between the salt of amino acid glycine with 2-hydroxy naphthaldehyde. By tridentate Schiff base of (ONO), donors were characterized by using U.V and spectrophotometer techniques. Complexes of Co(II) Ni(II) Cu(II) and Zn(II) ion with the ligand have been prepared, these complexes were identified by infrared, electronic spectral data, elemental analysis, magnetic moments, and molar conductivity measurements. It is concluded from the elemental analysis that all the complexes have (1:2) [metal:ligand] molar ratios, octahedral, with the exception to Zn(II) complex which have (1:1)[metal:ligand] molar ratio.
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
The penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.