<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, comes in second place with a gross ratio of 91%. Furthermore, Bayesian ridge (BR), linear regressor (LR), and stochastic gradient descent (SGD), with mean square error and with accuracy ratios of 84.365%, 84.363%, and 79%. As a result, the performance precision of these regression models yields. The interaction framework was designed to be a straightforward tool for working with this paradigm. This model is a valuable tool for establishing strategies to counter the swiftness of climate change in the area under study.</span>
Selective recovery of atropine from Datura innoxia seeds was studied. Applying pertraction in a rotating film contactor (RFC) the alkaloid was successfully recovered from native aqueous extracts obtained from the plant seeds. Decane as a liquid membrane and sulfuric acid as a stripping agent were used. Pertraction from native liquid extracts provided also a good atropine refinement, since the most of co-extracted from the plant species remained in the feed or membrane solution. Solid–liquid extraction of atropine from Datura innoxia seeds was coupled with RF-pertraction in order to purify simultaneously the extract obtained from the plant. Applying the integrated process, proposed in this study, a product containing 92.6% atropine was
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Water covers more than 75% of the earth's surface in the form of the ocean. The ocean investigation is far-fetched because the underwater environment has distinct phenomenal activities. The expansion of human activities inside underwater environments includes environmental monitoring, offshore field exploration, tactical surveillance, scientific data collection, and port security. This led to increased demand for underwater application communication systems. Therefore, the researcher develops many methods for underwater VLC Visible Light Communications. The new technology of blue laser is a type of VLC that has benefits in the application of underwater communications. This research article investigated the benefits of underwater blu
... Show MoreLandforms on the earth surface are so expensive to map or monitor. Remote Sensing observations from space platforms provide a synoptic view of terrain on images. Satellite multispectral data have an advantage in that the image data in various bands can be subjected to digital enhancement techniques for highlighting contrasts in objects for improving image interpretability. Geomorphological mapping involves the partitioning of the terrain into conceptual spatial entities based upon criteria. This paper illustrates how geomorphometry and mapping approaches can be used to produce geomorphological information related to the land surface, landforms and geomorphic systems. Remote Sensing application at Razzaza–Habbaria area southwest of Razz
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
This paper seeks to study the link between the fundamentalist evidence based on the observance of governance and interests and the ranks of the three legitimate purposes (necessary, need and detailed). The researcher followed the descriptive-analytical approach. The study reached important results, including that the measurement relates to the three ranks, but predominantly attached to measure the meaning of the need and the need, and the measurement of the semi-formal and semi-predominance improvement. Reclamation is considered by the majority of scholars to be authentic if it is related to the necessity and the need, and that it is not acceptable to improve only by a witness who recommends it. The excuses relate to Hajji and Tahini, no
... Show More