Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents a fuzzy model for predicting the effects of noise pollution on human work efficiency as a function of noise level, exposure time and age of the operators.
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreEach organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Background: obesity is a major global health problem with more than 200 million obese men and almost 300 million obese women. Melatonin is a well-known molecule for its involvement in circadian rhythm regulation and has multiple pathological actions including control of appetite, sleep wake cycle and metabolic syndrome.
Aim: to estimate the effect of melatonin supplements on obese patients on a calorie restricted diet in comparison to patients on lifestyle measures only in the form of weight loss, waist circumference and sleep quality.
Subjects and Method: one hundred patients with body mass index > 24 were collected, fifty patients were starte
... Show MoreThe problem of present study is determined by answering the following questions:
1) What is the effect of using the oral open- ended questions on Students' achievement in the third-stage of Arabic department in the college of Education? 2) What is the effect of the oral open-ended questions on developing the creative thinking of students in
... Show MoreThe target of this study was to synthesize several new Ciprofloxacin drug analogs by providing a nucleophilic substitution procedure that provides new functionality at the carboxylic group location. The analogs were synthesized, designed, and characterized by 1HNMR, and FTIR. The synthetic path began from the reaction of ciprofloxacin drug with morpholine to give compound[B], ciprofloxacin derivative was linked with a variety of primary and secondary amines to give compounds[B1-B9]. The above-mentioned prepared compounds [B3 and B5] were applied to liver enzymes, and the increase in the activity of these enzymes was observed. In addition, a theoretical study was conducted to study the energies and properties of the prepared co
... Show MoreThirty one samples of gum swabs were collected from patients with tooth caries (5-30 years old) from the College of Science (Biology department )- University of Baghdad- Iraq for the period from October 2018 to December 2018. , The samples were transported, after inoculation in a transport media (nutrient broth), to the laboratory of the College of Science and then cultured on mannitol salt agar and blood agar). The isolates belonging to Staphylococcus spp. were identified by biochemical tests and Vitek 2 compact system, while the more antibiotic resistant isolates were identified by using Polymerase Chain Reaction(ï´¾PCR) and sequencing of 16SrRNA . The results showed sharp UV absorption peaks at 330 - 340nm and AFM at 5
... Show More