This study simulates and assesses the hydraulic features and residual chlorine in Al-Najaf city’s water supply network using WaterGEMS. Field and laboratory work was done to determine pressure heads, velocities, and chlorine residual. Constructed model was validated using field data. Values of RMSE were between 0.08 and 0.1, and 0.05 and 0.06 for pressure and residual chlorine, respectively. The examination of water distribution system (WDS) during peak demand hours indicated that the pump unit’s capacity could not meet the high-water demand, resulting pressure loss with values between 0.1 and 2 bar. Simulated residual chlorine levels ranged between 0.45 and 0.8 ppm.
This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type (5052-O).
The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot. &nbs
... Show MoreSpecialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give
... Show MoreObjective: The aim of this study is to find out the impact of life events upon onset of depression, to describe the
prevalence of life events among depressed patients.
Methodology: Retrospective a case-control study conducted in AL-Diwanyia Teaching Hospital, Psychiatric
Department on A non-probability (purposive sample) of (60) depressed patients and (60) of healthy person were matched
with them from general population. The data were collected through the use of semi-structured interview by
questionnaire, which consists of two parts (1) divide, section A. cover letter and B. Sociodemographic data which consists
of 9-items, (2) Life events questionnaire consists of 51-items distributed to six dimensions include, family
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show More