In this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended
use as well as indicating pollution, which are useful in water quality management and decision making. The application of Water Quality Index (WQI) with ten physicochemical water quality parameters was performed to evaluate the quality of Euphrates River water for drinking usage. This was done by subjecting the water samples collected from seven stations within Al-Anbar province during the period 2004-2010 to comprehensive physicochemical analysis. The ten physicochemical parameters included: pH value, Alkalinity (ALK), Orthophosphate (PO4-3), Nitrate (NO3-),Sulphate (SO4-2), Chloride (Cl-), Total Hardness (TH), Calcium (Ca), Magnesium (Mg), and Total Dissolved Solids (TDS). The average annual overall WQI was found to be 107.59 through the study period. The high WQI obtained is a result of the high concentrations of Orthophosphate and Magnesium which can be attributed to the various human
activities taking place along the river banks. From this analysis the quality of the Euphrates River is classified as "very poor quality" ranging poor water at the river upstream near station (E1) and unsuitable for drinking at the river downstream near station (E7) with an annual minimum WQI of 89.34 in 2008 and maximum 112.44 in 2009. The present study demonstrated the application of WQI in estimating and understanding the water quality of Euphrates River. WQI appears to be promising in water quality management and a valuable tool in categorizing pollution sources in surface waters
In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c
Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Abstract
In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.
A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between
... Show MoreNahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a
... Show MoreResearch was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThis paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show More