This study simulates and assesses the hydraulic features and residual chlorine in Al-Najaf city’s water supply network using WaterGEMS. Field and laboratory work was done to determine pressure heads, velocities, and chlorine residual. Constructed model was validated using field data. Values of RMSE were between 0.08 and 0.1, and 0.05 and 0.06 for pressure and residual chlorine, respectively. The examination of water distribution system (WDS) during peak demand hours indicated that the pump unit’s capacity could not meet the high-water demand, resulting pressure loss with values between 0.1 and 2 bar. Simulated residual chlorine levels ranged between 0.45 and 0.8 ppm.
In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreA total of 20 raw milk samples were used as the fouling agent for evaluating the bacteriological effectiveness of cleaning and sanitizing of domestic milking equipment by using ozonated water at 0.5 ppm comparing to the warm water at 55! for 5 minutes respectively. The mean values of total aerobic bacteria, Coliform and E.coli that present on the plastic and stainless-steel containers after using the raw milk as fouling agent were 3.4×10-6 , 6.7x10-5 and 5.8×10-3 cfu/cm2 respectively , after cleaning the stainless steel containers by the ozonated water the mean values of total aerobic bacterial counts, Coliforms and E.coli bacteria were reduced to 1.2×10-6, 4.7×10-5 and 3.3×10-3 CFU/cm2 respectively. while after cleaning by the warm wa
... Show MoreAbstract. Al-Abbawy DAH, Al-Thahaibawi BMH, Al-Mayaly IKA, Younis KH. 2021. Assessment of some heavy metals in various aquatic plants of Al-Hawizeh Marsh, southern of Iraq. Biodiversitas 22: 338-345. In order to describe the degree of contamination of aquatic environments in Iraq, heavy metals analysis (Fe, Ni, Cr, Cd, Pb, and Zn) was conducted for six aquatic macrophytes from different locations of Al-Hawizeh Marsh in southern Iraq. The six species were Azolla filiculoides (floating plant), Ceratophyllum demersum, Potamogeton pectinatus, Najas marina (submerged plants), Phragmites australis, and Typha domingensis (emergent plants). The results indicate that cadmium, chromium, and iron concentrations in aquatic plants were above the
... Show MorePower switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show MoreThis study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show More