Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents a fuzzy model for predicting the effects of noise pollution on human work efficiency as a function of noise level, exposure time and age of the operators.
This study deals with air pollution tolerance index (APTI) and anatomical variation in leaves of two species of terrestrial plants Ficus sp. and Conocarpus sp. that have bee commonly the separated along roadsides in many stations within Babylon province. APTI values of both species were less than 10 during study period which represented sensitivity of these plants to air pollution. There are Anatomical responses to pollution in the leaves of both studied species. Main adaptations included increased thickness of parenchyma cell walls with clear dark deposits in sections of Ficus sp. from sections of stations 2 and 4 which represent polluted stations. Conocarpus sp. main adaptation included stomata increased in density and decreased in size w
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreThree hundred Iraqi people participated in demographic and attitudes study about red and white meat consumption. The mean age of the participants was 50 SD ± 11 years (mean 30-72); 51% were females and 49% males, mostly in forties who lived ≥ 5 years in Baghdad. The results showed that 80% of individuals prefer red meat. A 90% of people prefer fresh meat compared to frozen and processed meat. A 60% of people buy meat from popular markets. Nearly 87% of respondents believe the improving of livestock sector is essential and 80% of people confirmed there are obstacles to development this sector. An 80% of participates thought the reasons of the high prices of local fresh meat is the lack of plann
... Show MoreIn this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.
The aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show MoreThis research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).