During the period 1970-2006 the Marshes-land region was exposed to several change into many sides of vanishing steeling and growth as follow :
1- Drying this region after 1991,and re-flooded again during 2003. Many other large Marsh-land, like al-Hawaisa was dried by cutting off inlet-water fed from Iran sources .As asqunance there are transferred to different kinds of swamps ,followed by major change in the structure of the region as the rural settlement concerned. Rural settlement in this area starts new push of migration. The research did not take that in consideration in this thesis because some others took it in details in some thesis and researches. The situation of Marsh-land is getting anew face after those major changes which need an urgent action to over-come this issue . In this thesis the researcher focus on finding the relative important of variable affect those changes of rural settlement in the study area . Settlement this region was a parted tow kind :First settlement flooded big Marsh-land water while the second group of settlements found on the off shore of marsh-land .Beside that a remarkable change in (the second group).
Socio economic and environmental factors distinguished between the two groups which attract rural settlement of in the flooded area of Marsh-land were translated gradually to the second group ( on the off shore side ) . Both of those group were utile the advantage of the second group of settlement (off shore group ) were attracting the other sectored in the floodedarea for many reason :ie : Saw shore economic and environmental condition plus the high precipitins of all kind of serves, social and technical infrastructure . Researcher adept descriptive and quantities analysis for all variable collected by questioner for selective sample of household with personal interview and inventory. The thesis found very remarkable circulation and recommendation relatively given to
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010
This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreThe significant shortage of usable water resources necessitated the creation of safe and non-polluting ways to sterilize water and rehabilitate it for use. The aim of the present study was to examine the ability of using a gliding arc discharge to inactivate bacteria in water. Three types of Bacteria satisfactory were used to pollute water which are Escherichia coli (Gram-negative), Staphylococcus aurous (Gram-positive) and salmonella (Gram-negative). A DC power supply 12V at 100 Hz frequency was employed to produce plasma. pH of water is measured gradually during the plasma treatment process. Contaminated water treated by gliding arc discharge at steadying the gas flow rate (1.5 l/mi
Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreA new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
