The city of Karbala is one of the most important holy places for visitors and pilgrims from the Islamic faith, especially through the Arabian visit, when crowds of millions gather to commemorate the martyrdom of Imam Hussein. Offering services and medical treatments during this time is very important, especially when the crowds head to their destination (the holy shrine of Imam Hussein (a.s)). In recent years, the Arba'in visit has witnessed an obvious growth in the number of participants. The biggest challenge is the health risks, and the preventive measures for both organizers and visitors. Researchers identified various challenges and factors to facilitating the Arba'in visit. The purpose of this research is to deal with the religious and cultural events that occur during the Arba'in visit in Iraq by providing optimal and alternatives routes, and strategic resting points along the way from all cites to Karbala. This research depends on data analysis and artificial intelligence methods to determine the best routes and determine locations of the rest points accurately and effectively. These aims will be accomplished by analysing population distribution and potential paths. For the purpose of providing the best rest points on the proposed roads and decreasing the crowds within these stations, the rest stations are divided into two categories: main stations and sub-stations. The main stations contain services such as: rest places, accommodation, health and awareness services, in addition to providing food and drink; whereas the sub-stations comprise only rest places, sleep, food and drink. The research suggests that the main stations
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreA loS.sless (reversible) data hiding (embedding) method inside an image (translating medium) - presented in the present work using L_SB (least significant bit). technique which enables us to translate data using an image (host image), using a secret key, to be undetectable without losing any data or without changing the size and the external scene (visible properties) of the image, the hid-ing data is then can be extracted (without losing) by reversing &n
... Show MoreIn order for the process of removing pollutants, including dyes, from the aquatic environment to be effective, plant wastes such as banana peels were used as adsorbent surfaces by thermally activating them (ABP) and modifying them with iron oxide nanoparticles (MABP), which were characterized using Fourier transform infrared (FT-IR) and X-ray diffraction (XRD) techniques. They were applied in the field of Janus green (JG) dye adsorption for the batch system and studied the effect of several factors (adsorbent weight, contact time, initial concentration, and temperature). Their data were analyzed kinetically using first- and second-order kinetic models and they were found to follow the second order. Their data were also analyzed thro
... Show MoreThis research deals with the study of the relationship between the success factors as the independent variable and product strategies as the dependent variable , has reacted to these variables to form the frame , which is the research which centered research problem about the extent to which industrial companies the vision and knowledge of Muslim women survive and develop in the business market , which can be expressed about the extent of awareness of corporate success factors and the use of product strategies and what the relationship between the factors and strategies , while expressing the importance of research to make the focus on the product occupies a paramount importance in the industrial sector companies in relation to t
... Show MoreThe major cause of destruction during vertical vibration is the failure of the soil structure. The soil may fail due to loss of strength during continues vibration. The saturated sandy soil losses strength due to an increase in pore pressure, this phenomenon is called "liquefaction". Piled foundations are usually adopted as a foundation solution in potentially liquefiable soil under dynamic loading. In this research, 3D finite element model using PLAXIS Software was employed for pile foundation in saturated sandy soil. The results show the acceleration mobilization and velocity on the footing increases with increasing the intensity of dynamic loads and it becomes zero at maximum value of vertical settlement which indicates the end of the ti
... Show More