Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated. For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers proposed an alternative method for sewer sediment accumulation calculation using predictive models harnessing multiple linear regression model (MLRM) and artificial neural network (ANN). AL-Thawra trunk sewer in Baghdad city is selected as a case study area; data from a survey done on this trunk is used in the modeling process. Results showed that MLRM is acceptable, with an adjusted coefficient of determination (adj. R2) in order of 89.55%. ANN model found to be practical with R2 of 82.3% and fit the data better throughout its range. Sensitivity analysis showed that the flow is the most influential parameter on the depth of sediment deposition.
The present study has been carried out to estimate heavy metals mobility, bioconcentration and transfer from polluted soil to roots tissues and from roots tissues to aerial parts using bioconcentration factor and translocation factor. Soil samples and the biomass of the eight vegetable species have been collected during summer season, 2019 from four different sites in Wadi Al-Arg, Taif Governorate, KSA. In general, heavy metals content of soil samples in site III and IV have recorded elevated values compared with those of site I and II. The soil from site IV has shown the highest concentration of Mn, Ni, Cr, Pb, Cu, and Cd amounted 31.63, 14.05, 13.56, 22.79, 31.02 and 2.98 mg/kg dry soil respectively, while the soil from site III has sh
... Show MoreGas hydrate formation poses a significant threat to the production, processing, and transportation of natural gas. Accurate predictions of gas hydrate equilibrium conditions are essential for designing the gas production systems at safe operating conditions and mitigating the problems caused by hydrates formation. A new hydrate correlation for predicting gas hydrate equilibrium conditions was obtained for different gas mixtures containing methane, nitrogen and carbon dioxide. The new correlation is proposed for a pressure range of 1.7-330 MPa, a temperature range of 273-320 K, and for gas mixtures with specific gravity range of 0.553 to 1. The nonlinear regression technique was applie
This paper aims to study the damage generated due to creep-fatigue interaction behaviors in solid polyamide 6,6 and its composites that include 1%wt of carbon nanotubes or 30% wt short carbon fiber prepared by an injection technique. The investigation also includes studying the influence of applied temperatures higher than the glass transition temperatures on mechanical properties. The obtained results showed that the addition of reinforcement materials increased all the mechanical properties, while the increase in test temperature reduced all mechanical properties, especially for polyamide 6,6. The creep-fatigue interaction resistance also improved due to the addition of reinforcement materials by inc
... Show MoreBreast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8