In light of the intellectual and technological progress within the current developments of time, as well as the emergence of digital tools and means of display and communication, which had a major role in the shifts of the time of globalization in various commercial and economic fields, as well as areas of transferring the design image and its stages of development to customers and the convergence of views between the customer and the interior designer, which are the most important pillars of the design process As a whole, and accordingly, there is an urgent need for a process of intellectual balance between them through digital tools from the technical side and through social media from the intellectual side. Customer comments via socia
... Show MoreThe undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding
... Show MoreSince the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreInherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,
... Show MoreGroundwater is an important source of fresh water especially in countries having a decrease in or no surface water; therefore itis essential to assess the quality of groundwater and find the possibility of its use in different purposes (domestic; agricultural; animal; and other purposes). In this paper samples from 66 wells lying in different places in Baghdad city were used to determine 13 water parameters, to find the quality of groundwater and evaluate the possibility of using it for human, animal and irrigation by calculating WQI, SAR, RSC and Na% and TDS indicators. WQI results showed that the groundwater in all wells are not qualified for human use, while SAR and RSC indicated that most samples are suitable for irrigation use, and
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
In this study, field results data were conducted, implemented in 64 biofilm reactors to analyses extract organic matter nutrients from wastewater through a laboratory level nutrient removal process, biofilm layer moving process using anaerobic aerobic units. The kinetic layer biofilm reactors were continuously operating in Turbo 4BIO for BOD COD with nitrogen phosphorous. The Barakia plant is designed to serve 200,000 resident works on biological treatment through merge two process (activated sludge process, moving bed bio reactio MBBR) with an average wastewater flow of 50,000 m3/day the data were collected annually from 2017-2020. The water samples were analysis in the central labor
The economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj
... Show MoreIn general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More