النظام السياسي في كوريا الشمالة
The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε VO.
In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load applied on a footing resting on sandy soil at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into consideration include loading frequency, size of footing and different soil conditions. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used. The footings were tested by changing all parameters at the surface and at 50 mm depth below model surface. Meanwhile, the investigated paramete
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreBackground:-The Modified Alvarado Scoring System (MASS) has been reported to be a cheap and quick diagnostic tool in patients with acute appendicitis. However, differences in diagnostic accuracy have been observed if the scores were applied to various populations and clinical settings.
Objectives:- The purpose of this study was to evaluate the diagnostic value of Modified Alvarado Scoring System in patients with acute appendicitis in our setting.
Methods:-one hundre twenty eight patients ,were included in this study, admitted to Al-Kindy teaching hospital from June 2009 to June 2010. Patients’ age ranged from 8 to 56 years (21±10) they were divided into three groups; paediatrics, child bearing age females & adult males,. MAS
This research aims at studying and analyzing the creative research thinking of the educational staffs in private universities and colleges, and also the role of incentives, in its materialistic and moral sides in the development of such thinking and the pack of restraints which cause decline in interest level of the scientificresearch, and its weak role in the development of universities in Iraq, despite the interest of the Ministry of Higher Education and Scientific Research in Iraq in scientific research as part ofits academic and humanitarian targets.Based on study and analysis, and the using if some of statistical methods such as the Alpha Chronobaghcoefficient and the (T. Test)(F. Test),the research reached a number of conclusions.
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreToday, the prediction system and survival rate became an important request. A previous paper constructed a scoring system to predict breast cancer mortality at 5 to 10 years by using age, personal history of breast cancer, grade, TNM stage and multicentricity as prognostic factors in Spain population. This paper highlights the improvement of survival prediction by using fuzzy logic, through upgrading the scoring system to make it more accurate and efficient in cases of unknown factors, age groups, and in the way of how to calculate the final score. By using Matlab as a simulator, the result shows a wide variation in the possibility of values for calculating the risk percentage instead of only 16. Additionally, the accuracy will be calculate
... Show MoreIn the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More