Dust samples have been collected from three areas in Baghdad during dust storm occurred in 18th of June 2009 to characterize elemental particle size and composition by different techniques. The x-ray diffraction detected six minerals those are calcite, and quartz, present as a major components, dolomite, kaolinite, gypsum and plagioclase present as miner components .EDX detected some normal elements presented in local soil except traces of lead , nickel, and chromium. The particle size analysis by a set of sieves have revealed that the majority particle distribution was between (32 and 45)μm . To isolate the aerosol size, PM10 buoyancy method of powder in water showed a signifying amounts of particulate size .Scheerer’s method was applied to estimate the sizes of those particulate for quartz and calcite mineral .The estimation crystallite size of those separated particle was occur between (30 -55) nm for quartz and between (10 – 20) nm for calcite .Those sizes are highly affected the respiratory system of the human and even the animals .
PH measured values gave slightly alkaline (PH=7.8), and this value might affect on the plant nutrition.
<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreFusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreAssessment of the in service behavior of asphalt stabilized subgrade soil under environmental impact has got little attention by the research workers. However, the sustainability of the roadway depends mainly on the welfare of its subgrade soil condition. In this work, Gypseous soil was stabilized with asphalt emulsion for subgrade usage, the durability of the mixture has been assessed in term of its ability to maintain the compressive strength when practicing the environmental impacts. Specimens of 38 mm in diameter , and 76 mm in height have been prepared with various water-asphalt percentages, and subjected to 30 cycles of (freezing-thawing), (heating-cooling) and (wetting-drying) processes. Specimens have been tested for unconfined comp
... Show MoreThe research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi
... Show MoreDeaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b
Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra