The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing process. Then the CBTS was evaluated by the users using User Experience Questionnaire (UEQ) to prove the efficiency and correctness in billing process. The result shown that the users give the positive feedback of the CBTS.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreThe paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.
This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c
In this research, The effect of substituting sucrose with different level of DS and DG (0, 25, 30,50,70 and 100%) on the physiochemical, microbial and sensory properties of cake were studied. Cake models were as well construed for microbial content and organic structure during, before then next 35 days storing at experimental temperature. Results showed no significant variances (p < 0.01) in the chemo physical structure of the date and grape test cake for protein values while there were significant differences for Asch, fiber and fat content values, Sensory assessment results showed high significant variance (p < 0.01) among the cake trials with the exemption of texture (6.04-6.
Strengthening of composite beams is highly needed to upgrade the capacities of existing beams. The strengthening methods can be classified as active or passive techniques. Therefore, the main purpose of this study is to provide detailed FE simulations for strengthened and unstrengthened steel–concrete composite beams at the sagging and hogging moment regions with and without profiled steel sheeting. The developed models were verified against experimental results from the literature. The verified models were used to present comparisons between the effect of using external post-tensioning and CFRP laminates as strengthening techniques. Applying external post-tensioning at the sagging moment regions is more effective because of the e
... Show MoreThis study aimed at isolating uropathogenic Escherichia coli from urinary tract infections (UTIs) of human and cattle to examine the molecular diversity and phylogenetic relationship of the isolates. A total of 100 urine samples were collected from UTIs of human and cattle. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was tested against 10 antimicrobials. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to identify the genetic diversity among E. coli isolates from human and animal origin by using five different octamer primers. The gelJ software for the phylogenetic analysis created Dendrograms. Out of 50 human urine samples, E.
... Show MoreThis research dealt with the analysis of murder crime data in Iraq in its temporal and spatial dimensions, then it focused on building a new model with an algorithm that combines the characteristics associated with time and spatial series so that this model can predict more accurately than other models by comparing them with this model, which we called the Combined Regression model (CR), which consists of merging two models, the time series regression model with the spatial regression model, and making them one model that can analyze data in its temporal and spatial dimensions. Several models were used for comparison with the integrated model, namely Multiple Linear Regression (MLR), Decision Tree Regression (DTR), Random Forest Reg
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show More