In the present work, it had been measured the concentration of radon gas (CRn) for (10) samples of cement used in constructions before and after painting them using enamel paint, purchased from the local markets, to see the extent of its ability to reduce emissions of Rn-222 in the air. These samples were obtained from different sources available in the local markets in Baghdad and other provinces. The measurements were done by the American-made detector (RAD7). The results showed that the highest CRn in the air emitted from cement samples after coating was in the cement sample (Iranian origin) where the concentration was (58.27 Bq/m3) while the lowest CRn was found in building material samples in the white cement sample (Turkish origin) was (15.74 Bq/m3). In view of the present results, it has been confirmed that the concentration of Rn-222 emitted into the air in all building material samples is below the agency's permissible limit (ICRP).
Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
The penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreDiabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreThis research cancellations in life insurance policies and their impact on the solvency of the insurance companies (Applied Research in the Iraqi general insurance company), The study was descriptive approach in identifying and addressing variables which consists of {cancellations in life insurance} independent variable, the financial solvency of insurance companies as the dependent variable, and for the purpose of achieving the objectives of the research were formulated one hypothesis has been tested in the Iraqi insurance company, the researcher used the financial statements in the collection data needed for the study and information . The research found a number of conclusions highlighted that inflation, as well as economic variables
... Show MoreA (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
Escherichia coli (E. coli) is a frequent gram-negative bacterium that causes nosocomial infections, affecting more than 100 million patients annually worldwide. Bacterial lipopolysaccharide (LPS) from E. coli binds to toll-like receptor 4 (TLR4) and its co-receptor’s cluster of differentiation protein 14 (CD14) and myeloid differentiation factor 2 (MD2), collectively known as the LPS receptor complex. LPCAT2 participates in lipid-raft assembly by phospholipid remodelling. Previous research has proven that LPCAT2 co-localises in lipid rafts with TLR4 and regulates macrophage inflammatory response. However, no published evidence exists of the influence of LPCAT2 on the gene expression of the LPS receptor complex induced by smooth or rough b
... Show More