MB Mahmood, BN Dhannoon
In this paper solar radiation was studied over the Iraqi countary land. The best sun duration hours regions (maximum hours) in Iraq were estimated detected by using Geographic information system (GIS Ver. 9.2) program to apply the (Inverse distance weighting) IDW exact interpolation technique depending on the measured data of metrological stations were distributed on the land areas of Iraq. The total area of the best regions was calculated .Excel 2007 program is used in calculation, graphics and comparison the results.
In this paper, the oscillatory properties and asymptotic behaviour of a third-order three-dimensional neutral system are discussed. Some sufficient conditions are obtained to ensure that all bounded positive solutions of the system are oscillatory or non-oscillatory. On the other hand, the non-oscillatory solutions either converge or diverge when goes to infinity. A special technique is adopted to include all possible cases. The obtained results include illustrative examples.
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.
Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad
... Show MoreWith the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im
... Show More15 sediment samples were collected; 8 samples from the eastern bank, and 7 samples from the western bank of Al-Wind River in Diyala governorate to assess the sediment pollution in some trace elements such as Fe, Ni, Cd, Zr, Zn and Cu in addition to some oxides such as Al2O3, CaO, Na2O and K2O to find the effect of anthropogenic pollution and the industrial production on the sediment closed especially Naftkhana by using some geochemical pollution indices such as: geoaccumulation factor (I-geo), enrichment factor (EF),contamination factor (CF), pollution loud index (PLI) and to evaluate the degree of weathering by Applying the Chemical Index of Alteration (CIA)in both banks of Al-Wind River. The
... Show MoreThe aim of this paper is to construct cyclic subgroups of the projective general linear group over from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of into disjoint lines is discussed.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Power switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show MoreBackground: Neonatal septicemia (NNS) is the most serious complication in Neonatal Intensive Care Units (NICU) that demand urgent diagnosis and accurate treatment.
Methods: Serum was obtained from 31 neonates aged 1 hour-28 days that were diagnosed clinically and bacteriologically to have neonatal septicemia.
Results: Mean serum levels of both IL-8 and IL-1 recorded a significant increase in neonatal septicemia cases.
Conclusion: Usage of IL-8, IL-1 as diagnostic marker for NNS reduces unnecessary antibiotic therapy and therefore unnecessary costs, pain, and possible side effects of antibiotic
therapy and it may help to reduce development and spread of drug resistant bacteria.