This study was conducted to estimate some heavy metals cadmium, lead, nickel and iron in 15 samples of Iraqi honey with 3 replicates for each sample which were collected from apiaries near potential contamination areas in five Iraqi governorates, including Baghdad, Karbala, Babylon, Diyala and Salah al-Din. The atomic absorption technique was used to estimate the concentrations of heavy metals, the results showed that there were significant differences at (P≤0.05) between the concentrations of these elements in the honey samples, the highest concentrations of cadmium 0.123 mg/kg were recorded in Baghdad, near the petrochemical production complex, lead 4.657 mg/kg and nickel 0.023 mg/kg in Babylon near the power plant, iron was 1.863 mg/kg in Karbala near the waste collection and incineration plant, and all the concentrations of cadmium and lead in the studied honey samples were higher than the acceptable limits set by the European Commission Regulation.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
The research aims to design a narrow-band frequency drive amplifier (1.5GHz -1.6GHz), which is used to boost the transmitter amplifier's input signal or amplify the GPS, GlONASS signals at the L1 band.
The Power Amplifier printed circuit board (PCB) prototype was designed using InGaP HBT homogeneous technology transistor and GaAs Heterojunction Bipolar Transistor (HBT) transistor. Two models have been compared; one of the models gave 16dB gain, and the other gave 23dB when using an input power signal (-15dBm). The PCB consumes 2.4W of power and has a physical dimension of 11 x 4 cm.
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MoreThis paper reports test results and describes a numerical investigation of the effectiveness of using carbon fibre reinforced polymer (CFRP) fabrics for strengthening concrete cylinders that have been undamaged and damaged due to heating under preload. The purpose of this research was to investigate whether there is any difference in the performance of CFRP-wrapped cylinders if the wrapping is done under preload, and those for which neither heating, cooling nor wrapping was done under preload. The cylinders were exposed to 30% of maximum load at ambient temperature during heating and cooling before being wrapped under preload. Of 18 Ø 100 × 200 mm identical cylinders, 6 were left as control samples without heating, 12 were exposed t
... Show More