For criminal investigations, fingerprints remain the most reliable form of personal identification despite developments in other fields like DNA profiling. The objective of this work is to compare the performance of both commercial charcoal and activated carbon powder derived from the Alhagi plant to reveal latent fingerprints from different non-porous surfaces (cardboard, plain glass, aluminum foil sheet, China Dish, Plastic, and Switch). The effect of three variables on activated carbon production was investigated. These variables were the impregnation ratio (the weight ratio of KOH: dried raw material), the activation temperature, and the activation time. The effect factors were investigated using Central Composite Design (CCD) software. The optimum activation conditions were found as an impregnation ratio of 1:2.6, activated time of 160 min, and temperature of 630oC. The results of the comparison show that Alhagi active carbon powder (AAC) has a high ability to develop latent fingerprints on all surfaces except on plastic surfaces while the commercial charcoal failed to develop the latent fingerprint on both plastic and aluminum foil sheets surfaces. AAC was found to clearly show every feature of the latent fingerprints more than commercial charcoal for both males and females. Also, AAC has the ability to show latent fingerprints till 15 days while commercial charcoal has the ability to show latent fingerprints just till 7 days.
The vacancy of natural resources is undoubtedly limited by time. The sustainable development principle recommends modern technology for its protection and renewal. This project conducted analyses on two underground water sources in the north of Algeria (Mechroha Province). Besides, the use of the hardness factor and the adoption of the titration method, which is the determining the concentration of an unknown solution using a known solution concentration, have permitted the characterization of the examples taken and to verify their conformity to the standard required, the results found showed HT=6.66 French degrees (oF) ) for Ain Guilloume water spring in comparison to Ain Messai water spring H
The current research aims to analyze the content and and make a comparison based on the theory of art education as an organized cognitive area D.B.A.E. The researcher started by making a comparison followed by analysing the content to design a philosophical framework for content. He used these steps as starting point to study the comparison and some elements of art education due to the modern theories at the third intermediate stage in both Iraq and Egypt in light of the art education trend as an organizing cognitive area.
Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreThe main objective of present work is to describe the feasibility of friction stir welding (FSW) for
joining of low carbon steel with dimensions (3 mm X 80 mm X 150 mm). A matrix (3×3) of welding
parameters (welding speed and tool rotational speed) was used to see influence of each parameter on
properties of welded joint .Series of (FSW) experiments were conducted using CNC milling machine
utilizing the wide range of rotational speed and transverse speed of the machine. Effect of welding
parameters on mechanical properties of weld joints were investigated using different mechanical tests
including (tensile and microhardness tests ). Micro structural change during (FSW) process was
studied and different welding zones
This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreThis research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More