Tillage appearance device is mechanical, electric-electronic design, getting Patent from the Central Organization for Standardization and Quality Control – Industrial Property Department - Ministry of Planning – The Republic of IRAQ under number Patent 3876 in 20 / 4 / 2014, calculates the number of clods per area by Tillage appearance device, This is done through the generation electrical impulses are sent to the controlled accurate calculates number clods required space and shows the result on the screen in order to see the tillage view per area. Three factor used in these experiment, first factor represents forward speed of tractor three levels (3.5, 4.5, and 5.5 km/h), second factor represent soil moisture content at two levels (14
... Show MoreTest results of nine reinforced concrete one way slab with and without lacing reinforcement are reported. The tests were designed to study the effect of the lacing reinforcement on the flexural response of one way slabs. The test parameters were considered is the lacing steel ratios of (0, 0.0025, 0.0045, and 0.0065), flexural steel ratios of (0.0025, 0.0045, and 0.0065) and span to the effective depth ratios of (11, 13, and 16). Two specimens had no lacing reinforcement and the remaining seven specimens had the lacing reinforcement. Four point bending test were carried out, one of the specimens was tested under the static load applied gradually up to failure and the other specimens were tested under repeated load (5 cyc
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreTest anxiety for intermediate level The current study aims to measure the test anxiety of research’s sample and to identify the statistical differences of test anxiety, considering two variables gender and students classes level (first and third intermediate class). To do this, a stratified random sampling of (300) student from first and third intermediate classes had selected from both the karkh and Rusafa sides of Baghdad province for the academic year 2015-2016. The author tested the whole sample by using the test anxiety scale that had tested for its validity and reliability. The results revealed that the research’s sample as a whole was suffering from test anxiety, there were a statistical differences between male and female tha
... Show MoreTitanium alloys are broadly used in the medical and aerospace sectors. However, they are categorized within the hard-to-machine alloys ascribed to their higher chemical reactivity and lower thermal conductivity. This aim of this research was to study the impact of the dry-end-milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. This research aims to study the impact of the dry-end milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. Also, it seeks to develop a new hybrid neural model based on the training back propagation neural network (BPNN) with swarm optimization-gravitation search hybrid algorithms (PSO-GS
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreA Multiple System Biometric System Based on ECG Data
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More