Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreA simplified theoretical comparison of the hydrogen chloride (HCl) and hydrogen fluoride (HF) chemical lasers is presented by using computer program. The program is able to predict quantitative variations of the laser characteristics as a function of rotational and vibrational quantum number. Lasing is assumed to occur in a Fabry-Perot cavity on vibration-rotation transitions between two vibrational levels of hypothetical diatomic molecule. This study include a comprehensive parametric analysis that indicates that the large rotational constant of HF laser in comparison with HCl laser makes it relatively easy to satisfy the partial inversion criterion. The results of this computer program proved their credibility when compared with th
... Show MoreDEMs, thus, simply regular grids of elevation measurements over the land surface.The aim of the present work is to produce high resolution DEM for certain investigated region (i.e. Baghdad University Campus\ college of science). The easting and northing of 90 locations, including the ground-base and buildings of the studied area, have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from Quick-Bird satellite sensor (with spatial resolution of 0.6 m). It has been geo-referenced and rectified using 1st order polynomial transformation. many interpolation methods have been used to estimate the elevation such as ordinary Kriging, inverse distance weight
... Show MoreScheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreA long-span Prestressed Concrete Hunched Beam with Multi-Opening has been developed as an alternative to steel structural elements. The commercial finite element package ABAQUS/CAE version 2019 has been utilized. This article has presented the results of three-dimensional numerical simulations investigating the flexural behaviour of existing experimental work of supported Prestressed Concrete Hunched Beams with multiple openings of varying shapes under static monotonic loads. Insertion openings in such a beam lead to concentrate stresses at the corners of these openings; as a result, extensive cracking would appear. Correlation between numerical models and empirical work has also been discussed regarding load displacemen
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More