A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. These solutions provide substantial distinction in terms of performance and hence safety. Not only is the availability of different fire risk alleviation systems important, but so is the election of the most convenient solution for the job. This is typically seen inside regulatory procedures and basics of thumb or heuristics and depends on the knowledge and expertise of divergent specialists. When several perceived danger and results thresholds are surpassed, fixed firefighting systems are frequently included as extra fire protection and resilience measures
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Most studies indicated that the values of atmospheric variables have changed from their general rates due to pollution or global warming etc. Hence, the research indicates the changes of direct solar radiation values over a whole century i.e. from 1900 to 2000 depending on registered data for four cities, namely (Mosul - Baghdad - Rutba - Basra. Moreover, attemptsto correlate the direct solar radiation with the temperature values have been recorded over that period. The results showed that there is a decreasing pattern of radiation quantities over time throughout the study period, where the value of direct radiation over the city of Baghdad 5550 w/m2 was recorded in the year 1900, but this ratio decreased cle
... Show MoreOvako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Rhythm is considered one of the creative concepts in the recent architectural thought; it has emerged clearly as a mean of creating the highest levels of creativity in architecture, especially in contemporary architectural movements. The importance of rhythm has emerged, especially, when the architecture , its beginnings concentrated on the principle of the links with poetic structures. Many architectural studies deal with concept of rhythm in architecture with different ways various according to the trend of each study, this show the importance of studying the concept of rhythm in the architectural field in general. This study try to focus on the utilization of rhythm as creative system in architecture of heritage and contemporary
... Show More