Noise reduction is a significant field that appears in many aspects of life. There are many methods for speech noise reduction, especially for stationary noise. This paper talks about a new way to lower speech noise that combines the Log-MMSE (Logarithmic Minimum Mean Square Error) algorithm, which is used to improve speech signals that have been messed up by noise, with an adaptive Wiener filter with a decision-directed (DD) approach. This filter lowers musical noise and predicts the time-varying noise spectrum, which results in a better signal-to-noise ratio. The frame delay issue resulting from DD was resolved by utilizing the Two-Step Noise Reduction (TSNR) technique to reconstruct the harmonic structure of the voice signal that was
... Show MoreBrain tumors pose a significant global health concern, imposing substantial social and economic burdens. Accurate classification of tumor types (gliomas, meningiomas, and pituitary tumors) from MRI data is essential for aiding radiologists and avoiding invasive biopsies. This paper presents a new method for brain tumor classification that has excellent accuracy when compared with existing methods. The proposed method provides improvements for feature extraction and classification. This new method comprises MRI image preprocessing, feature extraction, and image classification. Preprocessing includes resizing and data augmentation. Following this, features are extracted from MRI images using a mixed transform approach involving a mix of me
... Show MoreThe deepfake videos were spread in the last few years and were created by different deepfake techniques (i.e., faceswap, face2face, etc.). These techniques have a terrible impact on society and would give anyone a chance to create videos with fake faces. The objective of this paper was to develop a model that detects deepfake videos to reduce their negative impact. Two hybrid models of machine learning and deep learning were proposed. The first model used a convolutional neural network (CNN) for feature extraction and different machine learning classifiers (support vector machine (SVM), k-nearest neighbor (KNN), decision tree (DT), random forest (RF), logistic regression, and naive bayes (NB)). In contrast, the second model used a transf
... Show MoreLet A be a 2- torsion free prime Γ- ring, and L be a square closed Lie ideal of A i.e. xβx∈L for all x∈L and β∈Γ, suppose that μ is an endomorphism of A, and f is a right μ- centralizer which is not the identity map on L, satisfying f([x, b]_γ )=〖∓[x,b]〗_γ ( or f(xδr)=∓xδr) for all x,b∈L , γ∈Γ, then L⊆Z(A).
Media platforms have become essential for staying informed about events and activities around the globe. While there has been research on identifying news in English, detecting it in Arabic has been relatively overlooked. The unique linguistic characteristics and diverse slang expressions in Arabic have contributed to a scarcity of studies in this area. This research examines the effectiveness of deep learning algorithms in identifying fake news, specifically in the Arabic language. In this study, Global Vectors for Word Representation (GloVe) were used to capture the semantic relationships between words in order to improve the performance of the models. Furthermore, the utilization of Long Short-Term Memory (LSTM) and Bidirectional LSTM
... Show MoreThe purpose of this study is to present a new concepts on a module M over a ring, these concepts is called R*-small sub module, R*-hollow module which present generalizations of the small submodule and hollow module, respectively. Key characteristics of these concepts such as the image and direct sum of R*-small sub module, R*-hollow module are R*-small submodule, R*-hollow submodule, respectively.
Voice encryption is crucial to protecting data during transmission and storage due to the widespread problem of document fabrication and forgery. Various methods have been used to protect important data, including encryption. Voice data encryption is a way to encrypt important messages within transmissions. Therefore, it needs a strong and efficient encryption algorithm, using the standard encryption algorithm known as Rijndeal. This method is reliable, secure and efficient, because the Rijndael algorithm is characterized by its key lengths and blocks of different sizes. The Rijndael algorithm is a method of decrypting audio files, making it a powerful tool for protecting sensitive information. This paper presents a method for encoding W
... Show MoreThe current work aims to study the effect of an inclined magnetohydro dynamics peristaltic transport of a non-Newtonian hyperbolic tangent fluid in a non-uniform channel via porous medium. The nonlinear governing equations regarding hyperbolic tangent fluid have been studied and solved analytically with the use of a regular perturbation approach under considerations of a long wavelength as well as low Reynolds number. All computational results are also discussed graphically using the MATHEMATICA program. The mathematical expressions for axial velocity and stream functions have been derived analytically. Different physical parameters have been shown graphically and discussed it's effect. It is established that increasing the Hartmann nu
... Show MoreIn this paper, we modify an SEIVR model concerning COVID-19 from the first-order system into a multi-fractional order system of differential equations. We also find an approximate solution by using the Sumudu Adomian decomposition method. Furthermore, we try to give qualitative results rather than qualitative results. Numerical simulation is given through a table and graphs which show the efficiency of the method.
Antibiotic resistance is a significant problem for which new treatments are required. There is growing concern about Fosfomycin resistance in Escherichia coli; understanding this resistance will help develop effective treatment strategies and preserve the efficacy of antibiotics. This study aimed to investigate the synergistic effects of Eugenol and Fosfomycin against Uropathogenic Escherichia coli (UPEC) and their possible potential as co-treatment. This study identified and isolated UPEC isolates from urine samples, with 63.6% being identified as UPEC. Antibiotic susceptibility tests showed that 99.3% of the UPEC isolates were resistant to multiple types of antibiotics [multidrug-resistant (MDR)]. The study examined t
... Show MoreHyaluronidase is an enzyme that primarily breaks down hyaluronic acid, thereby disrupting the structural integrity of the extracellular matrix (ECM) found in connective tissues, which is considered a virulence factor. Peganum is a genus of plants in the family Nitrariaceae that contains a number of alkaloids, including harmaline and harmine, which have been used in traditional medicine. This study aimed to investigate the effect of a plant-active compound (peganin) isolated from a plant sample as an inhibitor of hyaluronidase. In total, 120 samples were randomly isolated from infected burns. Isolates with highly hydrolyzed zones were identified. The Turbidity Reduction Assay was used to assess cell growth and hyaluronidase activity spect
... Show MoreShort-range effects on C2, C3, as well as C4 form factors in the 26Mg nucleus, were examined. The charge density distribution in this nucleus was also tested by means of one and two body fragments of cluster enlargement in cooperation with single-particle wave functions of harmonic potential. The correlation of Jastrow form was employed to inset the influence of short-range into the two body fragment of cluster enlargement. The nucleus of 26Mg was assumed to own a 16O-core with (A-16) nucleons dispersed over the sd-model space. The form factors in 26Mg nucleus ascend from the core-polarization and model space involvements. The form of Tassie model, subject to the charge densit
... Show MoreWe define and investigate Z- essential submodules as a generalization of essential submodules. Various characterizations and properties of Z-essential submodules are given. Moreover we introduce the concepts of Z-singular submodule and Z-closed submodules.
This work aimed to investigate the prevalence of pathogenic fungi and evaluate the antifungal activity of Trichoderma orientale FMR12486 crude extract against pathogenic fungi isolated from patients attending the National Center for Thoracic and Respiratory Diseases (having a history of tuberculosis) and consultant of Dermatology of Baghdad hospital, Iraq. A total of 80 clinical specimens were collected: 20 skin scrapings specimens and 60 sputum specimens. The results of direct examination by KOH 10% and culture showed that 11 (55%) cases from 20 skin specimens were positive for fungal infections, while in the sputum specimens, 28 (47%) cases from 60 were positive. Candida albicans represented the most common
... Show MoreIncreasingly, the availability of personal genomic data in cloud servers hosted by hospitals and research centers has incentivized researchers to turn to research that deals with analyzing genomic data. This is due to its importance in detecting diseases caused by genetic mutations, detecting genes that carry genetic diseases, and attempting to treat them in future generations. Secure query execution on encrypted data is considered an active research area in which encryption is used to ensure the confidentiality of genomic data while restricting the ability to process such data without first decrypting it. To provide a secure framework and future insight into the potential contributions of homomorphic encryption to the field o
... Show MoreThe COVID-19 pandemic has clasped the world by furore storm. India has been the epicenter of the surge in COVID cases since March 2021 which is being considered as the second wave. With every passing week, new guidelines were being implemented by various states as well as the central government to control the situation. Hospitals were running out of beds, oxygen, and medicinal supply with patients with comorbidities suffering the most. A handful of drugs have been approved for direct or emergency use to counter the situation. However, over time some of these drugs have faced strong backlash for being ineffective and hence are no longer in use. In this review, we shall study various vaccines that have been approved in India and abroad and
... Show MoreIdentifying the mass graves’ boundaries is a significant step in mass graves’ preparatory procedures. A laboratory experiment was conducted to determine the effectiveness of ground penetrating radar in identifying mass graves and delineating their boundaries in sandy soil. A GSSI SIR-3000 GPR system with a 1.5 GHz antenna was used for the experiment. Eight GPR profiles were run over a 0.16m-deep wooden sandbox that contained buried bones to simulate the mass grave. All GPR profiles were processed using zero time, background removal, and filters to produce clearer, more accurate, and interpretable GPR data. This geophysical technique showed its assistance and effectiveness in locating the mass grave and tracking its delineation within
... Show MoreThe approximate solution of a coupled nonlinear parabolic system with variable coefficients (CNPSVC) is found by using the mixing Galerkin finite element method (GFEM) in the variable of space with implicit finite difference method (IFDM) in the variable of time, for this reason, the method will be denoted by MGIM. In this method and at any step of time the CNPSVC is transformed into couple Galerkin nonlinear algebraic system (CGNAS), which is solved by applying the predictor and the corrector techniques (PCT), these techniques transform the CGNAS into a coupled Galerkin linear algebraic system (CGLAS). Then the Cholesky decomposition (ChDe) is used to solve it. The existence and uniqueness of the solution are proven. The stability and
... Show MoreThe study area is located in the northeastern part of Kirkuk Governorate, Iraq, and its goal is to assess the hydrochemical characteristics of groundwater, identify contamination levels and sources, and determine groundwater suitability for drinking. The water quality index (WQI) and heavy metals pollution index (HPI) were used to assess groundwater contamination levels of major elements and heavy metals. The results showed that all groundwater samples were alkaline and weakly mineralized water. The total dissolved solids in the groundwater were less than the maximum accepted limit for palatable water. Groundwater was classified as excellent to good water and does not exceed the critical drinking water value. Chemically, All indices indi
... Show MoreLet R be a commutative ring with identity, and let M be a left R-module. We define a proper sub-module N of an R-module M to be a weakly 2-quasi-prime sub-module if whenever 0≠r_1 r_2 m∈N, r_1 r_2∈R, m∈M, then either 〖r_1〗^2 m∈N or ∈〖r_2〗^2 m∈N. This concept is an expansion of the idea of a 2-quasi-prime sub-module, where a proper sub-module N of an R-module M is said to be a 2-quasi-prime sub-module if for all a,b∈R, x∈M and abx∈N then either a^2 x∈N or〖 b〗^2 x∈N. Various properties of weakly 2-quasi-prime sub-modules are considered.
Evolutionary algorithms (EAs) provide a framework for dealing with a variety of large-scale multi-objective problems (MOPs) in the field of evolutionary algorithms, when applied to different problem types. Although computational strategies for dealing with nonlinear regression problems are difficult to apply, we used the gravity search algorithm and combined it with these regressions to estimate and interpret the parameters. Estimation parameters for nonlinear regression and gravitational search algorithm (EPNGSA), enabling us to access them consistently. Estimating the nonlinear estimation parameter using general estimating equations. It is necessary to use Chebyshev's strategy in the leader recruitment procedure, which leads to tackl
... Show MoreIn this study, we delve into the intricacies of the reaction-diffusion system associated with neuronal activities, focusing on open bounded three dimensions convex domain. Employing the renowned Faedo-Galerkin method, alongside compactness techniques, we establish the uniqueness, existence, and initial data sensitivity of both weak and strong solutions within this framework. Furthermore, a comprehensive case analysis is presented, demonstrating the practical application of this methodology to the reaction-diffusion system under consideration.
Fusarium oxysporum f. sp. lycopersici is the causal agent of tomato wilt disease. The ability to infect particular plant species depends on specific genes that distinguish virulent fungi from their closely related nonvirulent relatives. These genes encode host-determining "virulence factors," including small, secreted proteins and enzymes involved in the synthesis of toxins. This research aims to study the impact of Trichoderma harazanium extract on the expression of frp1, snf1, and clc1 genes expression on five severely pathogenic isolates of Fusarium oxysporum f.sp. lycopersci for the first time in Iraq. The fungal isolates used in this study were isolated from infected tom
... Show MoreData security and its characteristics are considered one of the most important requirements of the modern era, as this generation is in rapid digital development. Therefore, it needs an effective methodology for a strong and effective encryption algorithm, by incorporating the standard encryption algorithm known as Rijndael. And steganography. The goal of this study is to transfer and store audio data with complete confidentiality and security. This study converts audio data into a 256 bit audio sample that we use for the purpose of encryption using the Rijndael algorithm, as this algorithm is known for its strength and for winning many awards. The principle of this algorithm’s work is to create multiple blocks of different block siz
... Show MoreThe environmental difficulties faced by Iraqi society, particularly in the countryside, worsen over time due to a lack of interest in environmental duties caused by a lack of awareness of the environmental risk. At a time when oil companies sought Iraqi government approval to invest in and develop Iraqi oil fields, particularly in the south of Iraq, heavy metals emerged as one of the most visible pollutants associated with the oil industry as by-products of oil extraction operations. Therefore, the environment is exposed to gradual demolitions that directly affect biodiversity and deteriorate water quality in the region. Consequently, it became necessary to find environmentally friendly treatment methods from the elements of the environm
... Show MoreImage fusion is integrating multiple images from many sources and changing them into a single image with clearer and more accurate information. Image fusion techniques have been proposed to enhance distorted input images using a smooth filter to improve the clarity of distorted images. This work fused images resulting from smooth filters (half left and half right) with size windows of (3×3), (5×5), (7×7), (9×9), and (11×11) pixels. The image resulting from the smooth filter towards the right was combined with the image from the smooth filter towards the left using traditional techniques such as addition, multiplication, and new suggested techniques, namely absolute real standard deviation, binary standard deviation, real covariance,
... Show MoreIn this study, we look into how the peristaltic flow MHD is affected by rotation, heat transfer, elasticity wall characteristics, and slip conditions. For simplification, the governing equations, infinite wavelength and small Reynolds numbers have been used to study the Newtonian fluid in a porous canal. Heat transport, elasticity, rotation, and slip conditions are taken into account. The Brinkman number, Hartman number, and other parameters are evaluated to observe their effects on the stream function, temperature, velocity, and coefficient of heat transfer. The results indicate that when these parameters are varied, more trapped boluses develop. Figures and graphs discuss and illustrate the impact of various values on these factors. Th
... Show MoreThe study of analytic univalent and multivalent function theory is an ancient subject of mathematics, particularly in complex analysis, that has drawn a large number of scholars due to the sheer elegance of its geometrical properties and the numerous research opportunities it provides. Researchers have been interested in the traditional study of this subject since at least 1907. During this time, many complex analysis researchers emerged, including Euler, Gauss, Riemann, Cauchy, and many others. Show several results for differential subordination using the convolution operator as well as broader hypergeometric functions. Geometric function theory is a synthesis of geometry and analysis. The main goal of this paper is to investigate the d
... Show MoreThe photoelectrode of the dye-sensitized solar cells was fabricated by sensitizing ZnO with a natural extract of Shami berries with different solvents. The working electrode of ZnO nanoparticles was synthesized using the sol-gel and dip-coating method and deposited onto ITO substrates using zinc acetate dihydrate as a precursor. The study investigated the effect of solvent type (methanol and ethanol), substrate withdrawal speed (1mm/s and 5mm/s), and catalyst agent (Triethanolamine (TEA) and Monoethanolamine (MEA)) on photoconversion in the dye-sensitized solar cell. An atomic force microscope examined the nanostructure of the prepared film, indicating nanoparticle sizes in the range from 48 to 105 nm. The optical properties analyzed w
... Show MoreThe accelerator driven system subcritical reactor assembly for Molybdenum-99 or 99Mo isotope production (ADS-SAMOP) reactor test facility is located at the Kartini research reactor complex. The direct exposure at the ADS-SAMOP reactor facility system can reach 1600 mSv/h at a distance of 1 meter from the center of the reactor core. The minimum ordinary concrete shielding required in the radial direction is 2 m thickness with 3-meter height to qualify the maximum dose for radiation workers of 7 μSv/h. The aim of this study is to improve shielding configuration to achieve safety requirements. The method used is a calculation using computer code based on Monte Carlo. The results show that, by using barite concrete with 3 m in he
... Show More