In this research study theory to find the stress and emotion gases in the glass as a result of exposure to pulses of the laser beam has been the study using vehicles three major on-system axes cylindrical (r, 0, z), where I took three models of glass silica glass soda glass fused and shedtwo types of lasers where the study showed that the thermal stresses and emotions ...
In order to evaluate the performance of introduced varieties of maize and test them under different levels of plant density, and to determine which of the introduced varieties give a high yield and at what plant density, a field experiment was carried out at Station A in the Department of Field Crops- College of Agricultural Engineering Sciences - University of Baghdad- Jadiriyah, for the fall season 2021, the RCBD design was used with four replications, in a split plot arrangement, the three plant densities (50.000, 70.000, and 90.000 Plant s ha-1) were the main plates, while the varieties represented the secondary factor, which is six varieties of maize, class 2 = 5783 DKC, Class 3 = 6315 DKC, Class 4= 6590 DKC, whic
... Show MoreThis study was conducted to detect the relationship between organic content in the sediment of Rivers Tigris and Diyala, at two locations south of Baghdad, with some environmental factors and the benthic invertebrates and values of diversity indices. Monthly samples collected from the area for the period November 2007 to October 2008. Results showed differences in the physical and chemical characteristics of the two sites, Where the annual average in Tigris and Diyala were respectively for: water temperature (19, 20) C°, pH (8, 8), dissolved oxygen (4, 8) mg / l , Biochemical oxygen Demand BOD5 (3,44 ) mg/l, TDS (632,1585) mg / l, TSS (42, 44) mg / l, turbidity (28,74) NTU, and total hardness as CaCO3 (485,823) mg / l ,Sulfat
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThe problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho
... Show MoreAmoxicillin have been conjugated with metronidazole as possible mutual prodrug to get a wider spectrum of activity by acting on aerobic and anaerobic bacteria, have antifungal activity, to provide protection for beta lactam ring of amoxicillin and also to improve patient compliance as it given as a single dose therapy. The structures of the synthesized compound were confirmed and characterized using elemental microanalysis (CHN), IR and some physiochemical properties. Biological study was done by using disc diffusion method against different bacterial strains which are , Staphylococcus aureus , Salmonella typhie , Pseudomonas aeruginosa , E. coli , Klebsiella pneumonia and fungi ( Candida albicans) . using nutrien
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.