Preferred Language
Articles
/
xhYQEIcBVTCNdQwCWjOQ
Operational assessment of biological wastewater treatment using advanced return-mass reactors based on principal component cluster analysis
...Show More Authors
Abstract<p>In this study, field results data were conducted, implemented in 64 biofilm reactors to analyses extract organic matter nutrients from wastewater through a laboratory level nutrient removal process, biofilm layer moving process using anaerobic aerobic units. The kinetic layer biofilm reactors were continuously operating in Turbo 4BIO for BOD COD with nitrogen phosphorous. The Barakia plant is designed to serve 200,000 resident works on biological treatment through merge two process (activated sludge process, moving bed bio reactio MBBR) with an average wastewater flow of 50,000 m3/day the data were collected annually from 2017-2020. The water samples were analysis in the central laboratory of the wastewater treatment plant in Barakia region by the Directorate Sanitation in Najaf is influential, wastewater at the treatment plant for Al-Bio-shaft saw major water quality parameters. The data was analysis of using a principal component approach a cluster study of the return-mass reactors. The results showed that the biological oxygen dem (BOD5, 126 mg / L), chemical oxygen dem (COD, 222 mg/L), total solids, total suspended solids (TSS, 223 mg/L) a pH of 7.6 over a period of 4years, also the optimum removal rate was 89 %of the BOD, under optimum conditions, 78 % of the chemical oxygen occurred in the air reactor by nitrification with an average ammonium removal yield of 67 %. The cluster analysis results showed that the years (2018, 2017, 2020) are a good level of treatment compared to 2020. The final effluent quality (an average value of three years) complies with the stringent regulations proposed by the Iraqi National Stards established by Regulation 25 of 1967 BOD / COD ratio were calculated Influence is 0.63 in total wastewater.</p>
Scopus Crossref
View Publication
Publication Date
Wed Dec 30 2015
Journal Name
Al-kindy College Medical Journal
Possibility of glucose level assessment using the blood of gingival probing and dental socket after tooth extraction
...Show More Authors

Background: The association between diabetes and inflammatory dental diseases had been studied extensively for more than 50 years. A large evidence base suggests that diabetes is associated with an increased prevalence, extent and severity of gingivitis and periodontitis and loss of teeth. Many patients do not aware that they are diabetic.Objectives:The aim of the current study was to assess a fast, non-invasive, safe procedure to screen for diabetes and its severity in dental clinics and to assess the change in blood glucose level before and after tooth extraction during periodontalResults: there were no significant differences between the blood samples collected before tooth extraction from finger puncture method (FPB) and the gingival

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 21 2021
Journal Name
Contemporary Clinical Dentistry
Assessment of maxillary incisors' angulation and position in different types of malocclusions using cone-beam computed tomography
...Show More Authors

Abstract Background: This study is aimed to assess the maxillary incisors’ root position, angulation, and buccal alveolar bone thickness in both genders and different classes of malocclusion using cone‑beam computed tomography (CBCT). Materials and Methods: Two hundred and six CBCT images were gathered and analyzed by three‑dimensional On‑Demand software to measure the variables of 803 maxillary central and lateral incisors. Genders and class difference was determined by unpaired t‑test, one‑way ANOVA, and Chi‑square tests. Results: Buccal root position of the maxillary incisors accounted for in the majority of the cases followed by the middle and palatal positions. The thickness of alveolar bone appears to have nearly the sam

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More