An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive condition inspection data for measuring the waiting times of the pipes at each condition class.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.
In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThis paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreLet R be a commutative ring with identity, and let M be a unity R-module. M is called a bounded R-module provided that there exists an element x?M such that annR(M) = annR(x). As a generalization of this concept, a concept of semi-bounded module has been introduced as follows: M is called a semi-bounded if there exists an element x?M such that . In this paper, some properties and characterizations of semi-bounded modules are given. Also, various basic results about semi-bounded modules are considered. Moreover, some relations between semi-bounded modules and other types of modules are considered.
The important of present study is to design rehabilitation program by using hypermedia for some injuries of smooth tissues in shoulder joint. This joint is most important to help badminton players in achieving their daily and sport tasks due to upper limp movements depend on health and active of this joint. Experimental approach with a manner of equal single station was used in present study and study simple consisted of 6 badminton players from Babylon and Al-Mahaweel clubs who have less sharp tissue smooth injury such (muscles, ligaments, pocket). We used (SPSS) to analyses pre, medal, post-tests data. In conclusion, hypermedia is positive benefit to rehabilitee of injuries of smooth tissues in shoulder joint for badminton pla
... Show MoreThe present study reports the effect of temperature and liquid hourly space velocity (LHSV) on the cumene cracking reaction rate and selectivity by using a laboratory continuous flow unit with fixed bed reactor operating at atmospheric pressure. The prepared HX zeolite was made from Iraqi kaolin with good crystallinity .The activity and selectivity of prepared HX-zeolite was compared with standard HY zeolite and HX zeolite catalysts in the temperature range of 673-823K and LHSV of 0.7-2.5 h-1 . It was found that the cumene conversion increases with increasing temperature and decreasing LHSV at 823K and LHSV of 0.7 h-1 the conversions 65.32, 42.88 and 59.42 mol% for HY, HX and prepared HX catalysts respectively and at LHSV of 2.5 h-1 and th
... Show More