Radio observations from astronomical sources like supernovae became one the most important sources of information about the physical properties of those objects. However, such radio observations are affected by various types of noise such as those from sky, background, receiver, and the system itself. Therefore, it is essential to eliminate or reduce these undesired noise from the signals in order to ensure accurate measurements and analysis of radio observations. One of the most commonly used methods for reducing the noise is to use a noise calibrator. In this study, the 3-m Baghdad University Radio Telescope (BURT) has been used to observe crab nebula with and without using a calibration unit in order to investigate its impact on the signal. Radio observations of crab nebula have been carried out for different periods in 2022. Several parameters of the telescope have been calculated and analyzed using statistical measurements with and without using the noise calibration unit. Those parameters are receiver gain, system temperature, antenna temperature, and degree per flux unit. The results of this research revealed that the fluctuation sensitivity of BURT improved by about an order of magnitude, when the noise calibration unit is used. The root mean square error and the radiometer equation of the antenna temperature decreased to less than 33% and 10%, respectively in comparison to their initial values. In conclusion, the noise calibration unit plays a crucial role to improve the sensitivity of a radio telescope drastically.
Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreGypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, perm
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
This study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.
The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreThe "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.
The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.
The study is bas
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreDeath is undoubtedly the theme of Don DeLillo’s White Noise. Murray Siskind, a College-on-the-Hill professor who is obsessed with the exploration and reinterpretation of American popular culture, talks about the Tibetan Book of the Dead, and the German mentor of Jack Gladney has been using the Egyptian Book of the Dead, translated into German. The core episode of the story is the Airborne Toxic Event, the associate of Heinrich (Jack’s teenage son), Orestes Mercator, dreams of becoming one of the great figures in the Guinness Book by challenging and confronting death by enclosing himself in a glass pen jam-packed with poisonous snakes, and Heinrich challenges an imprisoned mass murderer in a chess game. The scholarly expertise of Jack c
... Show MoreThis study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar
... Show More