Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant concentrations of the city of Baghdad. These maps indicate where the highest and lowest concentrations are based on the color gradient of the map.
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreThis study was aimed to investigate the response of two types of ornamental herbaceous plants (Wedelia trilobata and Jacobaea maritima 'Cirrus') to different agricultural environments and the application of potassium silicates to the living walls system LWS (Felt layer system) under the climate conditions of Baghdad city. Each experiment involved the cultivation of a different plant species, and the study duration was from September 15, 2021, to August 1, 2022. A Strip-Plot Design experiment was conducted using two factors: factor M with four levels of substrates (50% peatmoss and perlite (M1), 50% Vermicompost and perlite (M2), 50% Water hyacinth compost and perlite (M3), 50% wheat straw compost and perlite (M4)) and factor S with
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreIn this research investigation, a total of eighteen diverse tetra- and penta-lateral cyclic compounds were synthesized. These included 1,3,4-thiadiazole, thiazolidin-4-one (via an alternative method), 1,2,4-triazole, carbothioamide, thiazole-4-one, azetidin-2-one, and oxazole. The synthesis procedure entailed a sequence of reactions. The thiazolidine-4-one 1 was obtained by reaction p-aminobenzoic acid with thiosemicarbazide, followed by treatment with p-tolualdehyde to produce Schiff base 2. Reaction Schiff base 2 with mercaptoacetic acid in dry benzene was carried out to produce thiazolidine-4-one 3. In another synthesis pathway, the esterification of p-nitro benzoic acid with ethanol in the presence of sulfuric acid was
... Show MoreBackground: Hodgkin's lymphoma (HL), formerly called Hodgkin's diseases is an uncommon form of lymphoma. The incidence of Hodgkin's lymphoma shows marked heterogeneity with respect to age, gender, race, geographic area, social class and histological subtype. This study was carried out in an attempt to evaluate the incidence of Hodgkin's lymphoma of head and neck in Baghdad city. Materials and Methods: The diagnosed cases of Hodgkin's lymphoma of head and neck region in Baghdad city between (1990-1999) were collected and analyzed according to age, gender, site and the histopathological subtypes of the tumor. Results: Out of (702) cases of Hodgkin's lymphoma of ten years between (1990-1999),(362 ) of them were occurred in the head and neck
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show More