This study was conducted on the effect of the sedimentary source (the sediments coming from both the Iraqi-Iranian borderline and the Tigris river) on the optical and textural features, especially sphericity and roundness of feldspar minerals (potassium and plagioclase types) in soils of the southern part of the alluvial plain. Eight pedons were selected to represent the study area, five of them represented sediments coming from the borderline, which included pedons of (Badra, Taj Al-Din, Al-Shihabi, Jassan, and Galati), while two of them represent the sediments of the Tigris River (Essaouira, Al-Dabouni), the pedon of Ali Al-Gharbi was represented the mixing area of sediments of all the floods coming from the borderline and the sediments of the Tigris River. The roundness degree for the particles of potassium feldspar minerals was concentrated between the sub-angular (SA) and well- roundness (WR), as a well- roundness category was in Ali Al-Gharbi pedon and percentage reached 14.Particles of Plagioclase feldspar minerals showed the same pattern in the distribution of roundness categories. The sphericity degree for particles of Potassium Feldspar and Plagioclase minerals were compatible with the distribution of the roundness degree for those particles. The sphericity degree concentrated between the medium sphericity and the high sphericity. © 2021 Ecological Society of India. All rights reserved.
In this paper, the class of semi
A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreReseach target the most important topic, is Activity and ProfitabilityIndictors Analysis for
Nationality and Iraqi Insurance Company, In order to stand on them ability to cover its risks
and explore the efficiency asset and its avialible resources using to determine them abilities to
profit generation from its insurance activity. The analysis was focus to examine their profit
and activity power, and test the significant differences aming them performance. Test 2
hypothese that is related and result it sign that the 2 company no has significant differences at
profitability and activity level. The research depend on coneclusion, recommended two
company to work at efficiency with cost element of insurance activity in or
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreThe actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co