This paper presents an experimental study between uniform pile and different types of under-reamed pile, single bulb. The under-reamed piles are piles with enlarged bases that are suitable to resist considerable movement of the ground, filed up ground, soft clay, and loose sand which have advantages to increase the soil strength, uplift capacity, and decrease the displacement. In the present study, there are experimental analyze to performance the suitable under-reamed type under sinusoidal load from vertical vibration (motor-oscillator was mounted directly on the pile cap. The main finding of this work is that the pile capacity increases with the ream and that all stress values of so
An experiment was carried out to study the effects of Time Factor, potassium and Molybdenum on Rhizobium growth. The objective of the experiment, which conducted under laboratory conditions, was to investigate the interaction effects of using three levels of Molybdenum (0, 0.25, 2.50 mg Mo . Kg-1 sterile soil) and four levels of potassium (0, 25, 50, 100 mg K . Kg-1 sterile soil) on the viable counts of Rhizobium growth in the sterile soil after 3, 9, 15 and 21 days of incubation at 28°C. The results indicated that Molybdenum level 2.50 mg Mo . Kg-1 sterile soil and potassium level 50 mg K . Kg-1 sterile soil recorded the biggest significant increase in the viable counts of Rhizobium growth in the sterile soil especially after 15 da
... Show MoreThe present study has been carried out to estimate heavy metals mobility, bioconcentration and transfer from polluted soil to roots tissues and from roots tissues to aerial parts using bioconcentration factor and translocation factor. Soil samples and the biomass of the eight vegetable species have been collected during summer season, 2019 from four different sites in Wadi Al-Arg, Taif Governorate, KSA. In general, heavy metals content of soil samples in site III and IV have recorded elevated values compared with those of site I and II. The soil from site IV has shown the highest concentration of Mn, Ni, Cr, Pb, Cu, and Cd amounted 31.63, 14.05, 13.56, 22.79, 31.02 and 2.98 mg/kg dry soil respectively, while the soil from site III has sh
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.
The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreA new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show More