This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadrilaterals, and central-point figures (which is to be subdivided into: triangle; quadrilateral, and pentagon). The model also has the property of the diverse modes of display for the output results; i.e. the results can be displayed in the shape of TwoDimensional (2-D) and Three- Dimensional (3-D) representations. Visual Basic is the software depended as a main core in designing CISTNM to draw the suggested network in 2-D to display the network point positions and formations, and it can be linked with the available software such as ArcMap (GIS). The input data which is used as an application of the targeted geodetic surveying techniques (triangulation) is Chamchamal region as a case study in this research. The area lies in the north of Iraq. The results obtained after this application and verification, have proved that the CISTNM
can perform the required task easily and accurately.
Discriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
In this work, a comparative analysis for the behavior and pattern of the variations of the IF2 and T Ionospheric indices was conducted for the minimum and maximum years of solar cycles 23 and 24. Also, the correlative relationship between the two ionospheric indices was examined for the seasonal periods spanning from August 1996 to November 2008 for solar cycle 23 and from December 2008 to November 2019 for solar cycle 24. Statistical calculations were performed to compare predicted values with observed values for the selected indices during the tested timeframes. The study's findings revealed that the behavior of the examined indices exhibited almost similar variations throughout the studied timeframe. The seasonal variations were
... Show MorePhotocatalyst composed of core/shell magnetic zincoxysulfide nanocomposite coated with sulfonated polyindole ([email protected]/SPID) has been prepared and used for simultaneous photocatalytic H2 production and Bisphenol A (BPA) degradation. XRD, FE-SEM, EDX, BET surface area, UV-vis DRS and VSM were used to characterize the synthesized nanocomposites. The photocatalytic performance was evaluated using batch reactor under visible light irradiation. The photocatalytic activity of [email protected]/SPID nanocomposite was revealed to exceed that of [email protected] nanocomposite due to the heterojunctions between SPID and [email protected] species. The results exhibited that the effect of BPA initial concentration was found to be effectual on the improvement
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreInitially-produced isotopes during the course of the
The study included isolate and diagnose fungus Fusarium solani of the local soil and purified and development in the PDB medium and the filtrate extracted using a solvent (Ethyl acetate) to obtain the fungal secondary metabolites extract. This extract has shown bioactivity against both reference isolates (E.coli (ATCC25922) and S.aureus(NCTC6571)) and pathogenic isolates S.pyogenes, K. pneumonia and S.typhimurium using agar disk diffusion technique , The diameters of the inhibition zones of fungal secondary metabolites24.0 mm against E.coli and 31.5 mm against S.aureus,and 34.0 mm against K.pneumoniae and 18.0 mm against S.pyogenes and 33.5mm against S.typhimurium. The test revealed the minimum inhibitory concentration (MIC) of the fungal
... Show MoreBACKGROUND: The humeral shaft fractures have a good rate of union, despite this fact, still there is a significant rate of nonunion after nonoperative treatment and more often after operative treatment. AIM: The aim of the study is to evaluate the autogenous onlay graft with compression plate for treatment of persistent humeral shaft non-union with failed previous surgery both radiological and functional outcome. MATERIALS AND METHODS: A prospective study on twenty patients having persistent aseptic non-union age between 20 and 60 years old, after failed surgical treatment of fractures humeral shaft in Al-Zahra teaching and Al-Kindy teaching hospitals, while infected nonunion, diabetes mellitus, secondary metastasis, smoking, a
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More