Surface water samples from different locations within Tigris River's boundaries in Baghdad city have been analyzed for drinking purposes. Correlation coefficients among different parameters were determined. An attempt has been made to develop linear regression equations to predict the concentration of water quality constituents having significant correlation coefficients with electrical conductivity (EC). This study aims to find five regression models produced and validated using electrical conductivity as a predictor to predict total hardness (TH), calcium (Ca), chloride (Cl), sulfate (SO4), and total dissolved solids (TDS). The five models showed good/excellent prediction ability of the parameters mentioned above, which is a very good startup to establish a rule of thumb in the laboratories to compare between observations. The importance of linear regression equations in predicting surface water quality parameters is a method that can be applied to any other location.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe goal of the current study was to research the changes in hematological parameters: WBC count, RBCs count, Hb, PCV, neutrophil, lymphocyte, and monocyte in albino mice infected with Aspergillus fumigatus by intraperitoneal injection after induced immunosuppression by intraperitoneal injection of cortisone. The current research also examined an attempt to reduce the infection load by treating Solanum aculeastrum. The result shows higher decreased significance (P≤0. 05) in RBCs, Hb, and PCV after being infected with A. fumigatus 7. 1 ± 0. 8, 11. 3 ± 0. 5 and 41. 5 ± 2. 4, respectively, while the total WBC count, neutrophil, lymphocyte, and monocytes were increased significantly (P≤0. 05) after treatment with S. aculeastrum i
... Show MoreThe present research investigates joints welding of 304L austenitic stainless steel using metal inert gas (MIG) welding method. The research explores the effect of process parameters (arc voltage, wire feed rate, and electrode wire diameter) on the mechanical properties of stainless steel. The above variables are varied respectively with 18.5, 19, 19.5 V, 116, 127, 137 mm/s, and 0.8, 1, 1.2 mm, with E308L as a filler electrode. The design matrix of the experiments was determined using the design of experiment (DOE) program Minitab 17 based on the levels of input elements used. The Taguchi orthogonal matrix methodology (Taguchi) technique was used to develop some empirical analysis for the maximum tensile strength and proper surface
... Show MoreThe present study aimed to explain the dose-dependent possible deleterious effects of 30 day administration of Tramadol on some hematological and biochemical parameters of laboratory male rats (Rattus norvegicus), the study consisted of eighteen adult male rats randomly divided into three equal groups (each of six). Group 1 (control) were treated by intraperitoneal injection of normal saline solution (0.2 ml), group two (low dose) was treated by intraperitonealy (i.p) injection of Tramadol at a dose of 50 mg/kg/day, group three (high dose) was treated by intraperitonealy injection of Tramadol at a dose of 100 mg/kg/day for 30 days. At the end of experimental period, rats were sacrificed. Blood were collected by cardiac puncture to inv
... Show MoreThe study aims to reveal the degree of application of the alternative evaluation strategy in social studies in public education in the Kingdom of Saudi Arabia. It also aims to identify the opinions of experts on how to implement this. The study adopted the mixed methodology, which represented in the descriptive-analytical method, and qualitative methods through the grounded theory. The study used two tools namely: a questionnaire for assessments of social studies teachers and semi-structured interview questions. The results of the study showed a medium degree of appreciation for the application of alternative evaluation strategies by social studies teachers in general education with an average of (2.28). The results also showed that ther
... Show MoreThis paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show More