Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreThe work includes synthesis of 1,2,3-triazoles via click conditions and using the microwave irradiation starting from two synthesized azides: 2,3,4,6-tetra-O-acetyl-β-D-glucopyranosyl azide (5) and perfluorobutylethyl azide (10) and different terminal alkynes. It also includes microwave enhanced synthesis of tetrazoles via the reaction of two synthesized azides i.e., perfluorobutylethyl azide (10) and 1,5-diazidopentane (13) with benzoyl cyanide. Most of the prepared compounds have been characterized by: TLC, FT-IR, 1H NMR, 13C NMR, LC-MS and microelemental analysis
Microwave heating is caused by the ability of the materials to absorb microwave energy and convert it to heat. The aim of this study is to know the difference that will occur when heat treating the high strength aluminum alloys AA7075-T73 in a microwave furnace within different mediums (dry and acidic solution) at different times (30 and 60) minutes, on mechanical properties and fatigue life. The experimental results of microwave furnace heat energy showed that there were variations in the mechanical properties (ultimate stress, yielding stress, fatigue strength, fatigue life and hardness) with the variation in mediums and duration times when compared with samples without treatment. The ultimate stress, yielding stress and fatigue streng
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Current design codes and specifications allow for part of the bonded flexure tension reinforcement to be distributed over an effective flange width when the T-beams' flanges are in tension. This study presents an experimental and numerical investigation on the reinforced concrete flanged section's flexural behavior when reinforcement in the tension flange is laterally distributed. To achieve the goals of the study, numerical analysis using the finite element method was conducted on discretized flanged beam models validated via experimentally tested T-beam specimen. Parametric study was performed to investigate the effect of different parameters on the T-beams flexural behavior. The study revealed that a significant reduction in the
... Show More