The steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengt
... Show MoreThe presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s
... Show MoreThe current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreIn this research the subject of human ability to change, as it is proven in the Koran , which is proof of the argument against the ability of human change , whether the change in the positive or negative direction .
Here the limits of the research are limited to a study of analysis of human ability to change and this establishes the important of knowing that man has the ability while in the wrong way to change the path to the right path which Gifts and guidance .
The search required three demands and conclusion
- The first required :- is to try the idolaters to take out believers by right .
- The second required :- is to change what is inside the soul as a reason to enter blessings on man .
- The third required :- is good
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe objective of this study was shed light for cultivation and maintenance of Trichomonas vaginalis parasite growth after isolated it by vaginal swaps from females suffering vaginitis and abnormal vaginal discharges in these media CPLM and TAB media to detect growth curve, morphological changes and viability of parasite in the two culture media, together with effect of sheep and bovine serum on the growth of it. The results of this studies were showed there was abtaine differences between the two types of media , The maximum growth of parasite was in TAB medium after 72 hours incubation with use of bovine serum, while such growth was maximized after 144 hours incubation with the use of sheep serum. In CPLM medium, a maximum gro
... Show MoreWe define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra