Car drivers hear many kinds of noise inside their vehicles' cabins, and the most annoying ones are the noise generated by tires, engines, and outside winds. Noise affects the comfort of the passengers inside the cabin, and it’s sad to say that modern cars are noisier in many kinds of noise signals due to using a lot of plastic materials in new budget cars. For expensive and luxury cars, the problem is solved by using better sound insulation materials, but for the budget ones, the approach used here is effective. It is called Active Noise Cancellation and can be done using analog or digital electronics. An operational amplifier and filters are used for the analog one, and in the digital one, signal processor chips are used. In engineering, cost reduction is a significant goal, and it is here, by using low-cost signal processor chips to achieve this, and our nominee is the Arduino processor. It is a low-cost open-source processor used in many digital control fields but not for noise cancellation, which is the concern of this paper. Considering the moderate signal processing capabilities of Arduino processors, a decision is required on what type of cabin noise signals our nominee can remove, and our selection is road noise. To a great extent, road noise relates to its quality, and the metric of concern is road roughness. In this work, three types of roughness are considered, low, medium, and high, the noise obtained from each type is analyzed, and countermeasures were applied to reduce them. Max cancellation obtained per three types, low, medium, and high roughness are 10 to 12 dB.
This paper is based on the Sentinel-2 satellite data: the thermal, red, and NIR bands. The Babylon city was chosen in this study for different reasons: its location in the middle of Iraq and it represents the largest capitals of the Mesopotamia civilization in the word. The Land Surface Temperature (LST) was determined using a method that incorporates remote sensing, geographic information systems, and statistics. This process has made it possible to monitor the relationship between land usage and the land surface temperature for four seasons in the year 2021. The mapswere processed and analyzed by using ArcGIS software. Five maps of the LST were constructed. Each map represents diffe
(Use of models of game theory in determining the policies to maximize profits for the Pepsi Cola and Coca-Cola in the province of Baghdad)
Due to the importance of the theory of games especially theories of oligopoly in the study of the reality of competition among companies or governments and others the researcher linked theories of oligopoly to Econometrics to include all the policies used by companies after these theories were based on price and quantity only the researcher applied these theories to data taken from Pepsi Cola and Coca-Cola In Baghdad Steps of the solution where stated for the models proposed and solutions where found to be balance points is for the two companies according to the princi
... Show MoreWellbore instability problems cause nonproductive time, especially during drilling operations in the shale formations. These problems include stuck pipe, caving, lost circulation, and the tight hole, requiring more time to treat and therefore additional costs. The extensive hole collapse problem is considered one of the main challenges experienced when drilling in the Zubair shale formation. In turn, it is caused by nonproductive time and increasing well drilling expenditure. In this study, geomechanical modeling was used to determine a suitable mud weight window to overpass these problems and improve drilling performance for well development. Three failure criteria, including Mohr–Coulomb, modifie
In this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More