Security Problems in an RFID System
...Show More Authors
This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreGreen buildings are considered more efficient than traditional buildings due to the incorporated techniques and the multidisciplinary specializations required to comply with their specifications, in addition to the advanced commissioning, which undergoes before handing over the buildings to the owners to ensure requirements conformance. As a result, the appropriate selection of a project delivery system acts as the essential factor that affects the performance of the project. This research aims at building a system that helps to select the best method to implement green buildings. Through studying the recent research approaches in project delivery systems, the factors that affect the selection of the optimal implementation method fo
... Show MoreAmong the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For highe
... Show MoreThis study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil: (contaminated soil with the a
... Show MoreMB Mahmood, BN Dhannoon
CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe aim of this study was to making an analytical study in some kinematics variables in (200) meter breaststroke swimming to first ranking in championship 2003 – Spanish. The swimming in our country still suffering from several obstruction with retarded it’s development for the better since the investigators observe the insufficiency of swimming in our country to any analytical study for the international champions, this led to no specific and scientific discovering to these advanced levels as the estimation of the value of performance from the Iraqi coaches dependent on personality observation dependent on their opinion without referring to the specific and scientific diction. The investigators dependent on several kinematics variables
... Show MoreObjectives: Serratia marcescens is a gram-negative pathogen of many species. The ability of S. marcescens to form biofilms and its potent innate resistance to antimicrobials and cleaning solutions are both essential for its pathogenicity and survival. The present study was conducted to investigate the effect of glyceryl trinitrate (GTN) on the biofilm of S. marcescens, as an alternative for antibiotic therapy. Methods: Different specimens, including ear swabs, burns, mid-stream urine, wound swabs, and sputum, were collected from patients who were brought to Al-Ramadi Hospital, Iraq. All samples were cultured, and the colonies that were obtained were detected using the VITEK® 2 compact. The ability of biofilms to develop was e
... Show More