Hygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is a basic principle. For that reason, this research was executed to compare gravity and pressure sand filters in terms of construction, use, efficiency, filtration rate, cost, benefit, and drawbacks to predict the performance of those units under different conditions and from an economic standpoint. It also served as a presentation and review of previous studies dealing with the evaluation and development of pressure and gravity filters. This paper gives a brief overview of filtration theory, the types and properties of filter media, filter backwashing, and operational problems that can be avoided in the filtration process.
The behavior of AC conductivity (σac), loss tangent (tan δ), and relative permittivity (ε′) for composites of PVC-P/graphite electrode waste (GEW) was investigated, and a qualitative explanation was provided as a function of PVC-P weight fractions (0, 5, 10, 15, 20, and 25) wt. percent, temperature (30-90) °C, and frequency (100Hz-2MHz). The behaviors of the composites' ac. conductivity and impedance as a frequency function and temperature have been examined. The permittivity was shown to rise with increasing temperature (Tg). The relative permittivity increased as the GEW filler concentration increased and was highest in the low-frequency range; nevertheless decreased as the frequency increased.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe
... Show MoreMany of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?
The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s
... Show More(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show MoreThis paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAbstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show More