Recently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevation Model (DEM), land use layer (LU), “Look–Up tables” and other layers resulted from running the software. Curve Number which expresses a catchment’s response to a storm event has been estimated in this study to each land parcel based on LU layer and soil layer within each parcel. The results showed that a CN of 100 (dark Blue) means surface water. The high curve numbers (100 -81) (Blue and light Blue) corresponding to urbanized areas means high runoff and low infiltration; whereas low curve numbers (77- 58) (Brown and light Brown) corresponding to the forested area means low runoff and high infiltration. Four classes of land cover have been identified; these are surface water, medium residential, forest and agriculture.
Sorting and grading agricultural crops using manual sorting is a cumbersome and arduous process, in addition to the high costs and increased labor, as well as the low quality of sorting and grading compared to automatic sorting. the importance of deep learning, which includes the artificial neural network in prediction, also shows the importance of automated sorting in terms of efficiency, quality, and accuracy of sorting and grading. artificial neural network in predicting values and choosing what is good and suitable for agricultural crops, especially local lemons.
The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreThe current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe present work reports a direct experimental comparison of the catalytic hydrodesulfurization of
thiophene over Co-Mo/Al2O3 in fixed- and fluidized-bed reactors under the same conditions. An
experimental pilot plant scale was constructed in the laboratories of chemical engineering department,
Baghdad University; fixed-bed unit (2.54 cm diameter, and 60cm length) and fluidized-bed unit (diameter of 2.54 cm and 40 cm long with a separation zone of 30 cm long and 12.7 cm diameter). The affecting
variables studied in the two systems were reaction temperature of (308 – 460) oC, Liquid hourly space
velocity of (2 – 5) hr-1, and catalyst particle size of (0.075-0.5) mm. It was found in both operations that the
conversion
Micro metal forming has an application potential in different industrial fields. Flexible tool-assisted sheet metal forming at micro scale is among the forming techniques that have increasingly attracted wide attention of researchers. This forming process is a suitable technique for producing micro components because of its inexpensive process, high quality products and relatively high production rate. This study presents a novel micro deep drawing technique through using floating ring as an assistant die with flexible pad as a main die. The floating ring designed with specified geometry is located between the process workpiece and the rubber pad. The function of the floating ring in this work is to produce SS304 micro cups with profile
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MorePulsatile drug delivery systems are time-controlled dosage forms which are designed to release the active pharmaceutical ingredient after a predetermined lag time to synchronize the disease circadian rhythm. A migraine shows circadian rhythm with a marked increase in attacks between 6 a.m. and 8 a.m.
Sumatriptan is a selective agonist at serotonin (5-Hydroxy tryptamine1 (5-HT1))receptors, is an effective treatment for acute migraine attacks.
The aim of this work is to prepare time-controlled press-coated tablet with a lag time of 5.45 hrs.
Six formulas of fast dissolving core tablets and three formulas of press-coated tablets were prepared by using direct compression method using different variables to prepa
... Show More