Abstract
An optoelectronic system for fog detection and visibility technique is presented .The idea of this research is based on the measurement of the atmospheric visibility by using an infrared beam emitter from LED diode. The optical scattering is used as a method to calculate the visibility. This method is applied at forward scattering within a foggy atmosphere, which is modern and has great importance for measuring visibility in seaports, airports, public roads and highways. In this paper we focus on the description of the system, principles of its operation and some results of field tests.
Keywords: fog sensor, visibility sensor, backscattering, forward scattering.
Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.
The article considers metaphors as one of the fundamental means used by L. Ulitskaya when writing the family chronicle "Medea and her Children" (1996), for the formation of images of heroines - representatives of the pronounced feminine principle in the work. Here I describe the results of the next stage of research related to the work of Lyudmila Evgenievna Ulitskaya as a representative of modern Russian prose.
This research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it ac
... Show MoreA series of tests were conducted to determine the susceptibility of eggs and neonates of the Rice Weevil Sitophilus oryzae L. (Coleoptera: Curculionidae), exposed to the insect growth regulator, Pyriproxyfen, on filter paper and on rough rice. In the first test, the hatch rate of eggs exposed on filter paper treated with Pyriproxyfen at the label rate of 0.003 mg [AI] /cm2 when used as a surface treatment in structures was 52.0 ± 7.3% compared to 93.0 ± 3.3% on untreated controls. In the second test, eggs were exposed to a dose-response series of 0.00003 to 0.03 mg [AI]/ cm2. Egg hatch was directly proportional to concentration and anged from 85.0 ± 2.0% on untreated controls to 26.7 ± 8.3% at the highest concentration tested. In the
... Show MoreThis paper study two stratified quantile regression models of the marginal and the conditional varieties. We estimate the quantile functions of these models by using two nonparametric methods of smoothing spline (B-spline) and kernel regression (Nadaraya-Watson). The estimates can be obtained by solve nonparametric quantile regression problem which means minimizing the quantile regression objective functions and using the approach of varying coefficient models. The main goal is discussing the comparison between the estimators of the two nonparametric methods and adopting the best one between them
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe primary aim of this research was to study visual spatial attention and its impact on the accuracy of the diagonal spike in volleyball. A total of 20 volleyball players of Baghdad participated in this study. The sample was homogeneous in terms of height, weight and age of the players. The tests used in the present study were: 1) Visual Spatial Attention Test. 2) Volleyball Spike Test. Based on the findings of the study, the researcher concluded that visual spatial attention has a significant impact on the accuracy of the diagonal spike in volleyball.
Objective: This project aimed to study the morphological description and histological structure of ileum in Iraqi black partridge (