In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
Al- Masab AL-Aam canal (or the Main Drain) is a vital strategic project in Iraq. It collects the drain water from the agricultural lands and drains to the Arabian Gulf via Shatt Al-Basra. Fifteen water samples were collected from different sites along the course of the Al- Masab Al-Aam canal southern sector extending from Nasiriyah Basra to evaluate the hydrochemical properties. The variation of the sediment’s texture along the southern sector was investigated. The results reflected that the sediment is characterized by the presence of sand, silt, and clay. It is noted that the amount of salt in the water increases during the summer when temperatures are rising, and consequently, the evaporation rate increases. Changes in the saturatio
... Show MoreA design for a photovoltaic-thermal (PVT) assembly with a water-cooled heat sink was planned, constructed, and experimentally evaluated in the climatic conditions of the southern region of Iraq during the summertime. The water-cooled heat sink was applied to thermally manage the PV cells, in order to boost the electrical output of the PVT system. A set of temperature sensors was installed to monitor the water intake, exit, and cell temperatures. The climatic parameters including the wind velocity, atmospheric pressure, and solar irradiation were also monitored on a daily basis. The effects of solar irradiation on the average PV temperature, electrical power, and overall electrical-thermal efficiency were investigated. The findings i
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
The poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreDue to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application
... Show MoreThis study was aimed to assess the impact of vermicompost, glutathione, and their interaction on beetroot (Beta vulgaris L.) growth, yield, and antioxidant traits. The experiment carried out at vegetable field of the College of Agricultural Engineering Sciences - University of Baghdad during fall season 2019. The experiment was conducted using factorial arrangement within Randomized Complete Block Design with two factors and three replicates (3X3X3). Applying vermicompost before cultivation represented the first factor (0, 15, 30 ton.ha-1), which symbolized (V0, V1, V2). Glutathione (0, 75, 150 mg.L-1) which symbolized (G0, G1, G2) represented the second factor. Results showed the superiority of secondary interaction treatment V2G2
... Show MoreReaction of L1 [((E)-N1-(nitrobenzylidene)benzene-1,2-diamine] and L2( m-aminophenol), and one equivalent of di- or tri-valent metals(Cr(ӀӀӀ), Mn(ӀӀ), Fe(ӀӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ) afforded the complexes [M(L1)(L2)2]Cl, M=Cr(ӀӀӀ) and Fe(ӀӀӀ) and the complexes [M(L1)(L2)2] M= Mn(ӀӀ), Co(ӀӀ), Ni(ӀӀ), Cu(ӀӀ) and Zn(ӀӀ). The structure of the Schiff base ligand and their complexes are characterized by (C:H:N), FT.IR, UV.Vis, 1HNMR, 13CNMR and mass spectral. The presence of metal in the complexes are characterized by flame atomic absorption. The spectral data of the complexes have revealed the octahedral geometry. The (L1), (L2) and mixed ligand metal complexes were screened for their ability as cataly
... Show More