This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation classes (MFC) is the fundamental tool for windows programming. It has been used to build a Man-Machine Interface (MMI), which was used for processing and monitoring acquisition data from environment weather.
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreThe Anticyclone Merge affects Iraq’s climate clearly through its impact on the different climatic elements. where it appears while they pass through special and distinctive weather . and most of this affection appears in temperatures, Therefore, this research study the relationship between the repetition and the survival period of the Anticyclone Merge and temperature average by using coefficient correlation (Pearson) that shows there’s strong inverse relationship between the integration of Anticyclones and temperatures average. &nbs
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Table tennis is considered one of the fast base sports that the player needs to have the speed of performance and awareness, especially in straight forward and back strikes, which is an important offensive skills, and the player success depends on his perception speed to the point of the fall of the ball in the arena of his competitor. But there is no way to measure cognitive processing speed. Therefore, the researchers sought to design a test that measures this ability to ensure its scientific evaluation, and then establish standard scores for this test for the players of the specialized school of table tennis, to help evaluate them objectively and move away from subjective estimates when evaluating and developing measuring instruments in
... Show MoreThe paper presents an investigation to the flutter speed of composite wing for different ply orientation. Structurally the composite wing was idealized as a composite beam load carrying structure. Theodorsen’s expression was used to get the 2- dimension unsteady lifting force and pitching moment in the limit of incompressible flow and subsonic speed which were integrated over the wing span. A free vibration analysis was first carried out to get the natural frequencies and mode shapes .The velocity-damping (V-g) method was used to calculate the flutter speed and the flutter frequency. A wing of unmanned aerial vehicle was manufactured from woven glass and polyester resin where the flutter speed was calculated experimentally by the wind
... Show MoreThe speed of skills has become linked to modern methods of individual and group play, and each of them has begun to serve the other tactically. Through the follow-up of the researchers, they noticed that there is a significant weakness in the speed of performance and slowness in mental preparation, which plays a major role in understanding mental readiness, which is linked to the speed of making decisions during the game, as well as the weakness of the physical speed of the female players, which in turn has an impact on the skill performance of the players of the Iraqi clubs, which are the main supporter of the national team. The study aimed to identify the effect of interactive speed training on the performance of some skills among
... Show More