This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as compared with matching by minimum distance, gave (94%) and (83%) score by using group (1), (gp) and features respectively, which is much better than the minimum distance. Recognition using (gp) neural network (NN) gave a (94%) and (72%) score by using group (2), (gp) and features respectively, while the minimum distance gave (11%) and (33%) scores. Time consumption
through the recognition process using (NN) with (gp) is less than that minimum distance.
Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
Background: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Re
... Show MoreSevere Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) has caused enormous issues worldwide and is the most infectious pandemic. This study included 50 subjects (evenly distributed between sexes) and their range of ages starting from 2 to 67 years. According to the study's result, the ages and genders of subjects include susceptibility to COVID-19. Males were found to be more infected than females, and the ages of 36 to 67 were more common than other age ranges. Also, BMI calculations revealed that male patients with COVID-19 have the highest percentage of obesity. The clinical parameter results have been found serum C‐reactive protein (CRP) as an essential indicator that changes significantly in infection with COVID‐19 an
... Show MoreIn this work, an important sugar alkynyl ether has been synthesized in two subsequent steps starting from commercially available D-galactose (3). This kind of compounds is highly significant in the synthesis of biologically active molecules such as 1,2,3-triazole and isoxazoles. In the first step, galactose (3) was reacted with acetone in the presence of anhydrous copper (II) sulfate to produce 1,2:3,4-di-O-isopropylidene-α-D-galactose (4) in good yield. The latter was reacted with excess of 3-bromoprop-1-yne in DMF in the presence of NaOH pellets to afford the target molecule 5 in a very good yield. The temperature of this step is crucial in determining the reaction yi
... Show MoreRegistration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by de
... Show MoreA long-span Prestressed Concrete Hunched Beam with Multi-Quadrilateral Opening has been developed as an alternative to steel structural elements. An experimental program was created and evaluated utilizing a single mid-span monotonic static load on simply supported beams, which included six beams with openings and the solid control beam without openings, to investigate the performance of such beams. The number and height of the quadrilateral openings are the variables to consider. According to test results, the presence of openings in the prestressed concrete hunched beam with multi-quadrilateral opening did not considerably affect their ultimate load capacity with respect to a contro
Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration p
... Show More