Much has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreThe Impact of Intellectual trends on the nature of the Economic Structure of Iraq
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding. The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.
The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force. Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i
... Show MoreThe research aims to study the effect of an increase in funding the Equity by issuing new common shares on revenues ordinary shares, despite the issuance and marketing costs and the introduction of new shareholders that companies incur when issuing new common shares but it is the most important methods used to finance the Equity is funding the common shares it provides money sufficient to finance the large investments of the company and enhance the confidence of dealers with the company, so I designed this research in order to identify the impact of increased funding Equity issue new common shares to common shares revenues.
This research has included some of the theoretical concepts to each of the Equity
... Show More