Preferred Language
Articles
/
bsj-7472
Solid Waste Treatment Using Multi-Criteria Decision Support Methods Case Study Lattakia City
...Show More Authors

Lattakia city faces many problems related to the mismanagement of solid waste, as the disposal process is limited to the random Al-Bassa landfill without treatment. Therefore, solid waste management poses a special challenge to decision-makers by choosing the appropriate tool that supports strategic decisions in choosing municipal solid waste treatment methods and evaluating their management systems. As the human is primarily responsible for the formation of waste, this study aims to measure the degree of environmental awareness in the Lattakia Governorate from the point of view of the research sample members and to discuss the effect of the studied variables (place of residence, educational level, gender, age, and professional status) on the level of environmental awareness. Data were collected and analyzed using the SPSS.21 statistical package. This study also presents a methodology to find the optimal scenario for solid waste treatment using the hierarchical analysis method represented by Expert Choice 11.1.

The study found that there is an environmental awareness about the danger of the increasing percentage of environmental pollution and the presence of a social willingness to contribute to solid waste management, such as household sorting and working in voluntary associations. Environmental awareness is spreading throughout the province, but more attention is paid to the environment in the countryside than in the city. It was also found that environmental awareness is linked to the cultural level, and it was equal between males and females.

The study also provided the optimal treatment method for solid waste according to the theory of hierarchical analysis, where the biogas production method ranked first with a rate of 35.5%, followed by the composting production method with 22.6%, the recycling method with 17.4%, followed by the incineration method by 15%. The sanitary landfill method ranked last, with 9.5%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Using LiF Disc in Thermoluminescence Dosimetry
...Show More Authors

A LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Wed Feb 04 2015
Journal Name
The Second Biological Science Conference
Bioethanol Production Using Date Syrup Wastes
...Show More Authors

Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 21 2017
Journal Name
Lecture Notes In Computer Science
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Using Online Platforms to Improve Writing
...Show More Authors

Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu

... Show More
View Publication Preview PDF
Crossref