1 Electrochemical Analysis of Sulfamethoxazole by Differential pulse voltammograms Method , Ahmad Khalaf Alkhawaldeh
Manganese and Molybdenum oxides are well-known electro-catalysts in fuel cells systems; they are usually used as anodic materials for the oxidation of low molecular weight alcohols. The utilization of MoO2 and MnO2 as catalysts in the pharmaceutical analysis is not common yet an analytical method for the determination of Sulfamethoxazole (SMX) antibacterial agents in Pharmaceutical Dosage form is developed. The method is based on the voltammetric determination of SMX using modified glassy carbon electrode by molybdenum oxide. The two components are oxidized at the modified electrode surface with the development of current that is linearly proportional to their concentrations in the range of 7.04*10-7- 1*10-3 M for SMX. The oxidation reaction of the two components is pH-dependent, in which the buffer used is Britton-Robinson at pH = 7.00 where maximum peak current and maximum peak separation is obtained. The regression factors obtained from the calibration curves are 0.9790 for SMX and 0.9812 for TMP. The method of analysis was validated, where the limit of detection (LOD) and the limit of quantitation (LOQ) of SMX were calculated to be 1.44*10-4 M, 4.36*10-4 M and 1.27*10-4 M, 3.84*10-4 M respectively, The percentage recovery of both components was also calculated to 81 % for SMX.  
2 Seasonal Variation in Physicochemical Properties Of Water From Fish Ponds in Osagin Fish Farm At Akinyele Local Government, Ibadan, Oyo State , Adekanmi Abideen Adeyinka 1, Muraina Taoreed Adekunle 7, Adekanmi Uthman Taiwo 2,  Olasupo Abdulhakeem Dapo 5, 6, Oyekanmi Hidayat Adeola 3, Adekanmi Muminat Yemisi 4
Assessment of the quality of water in fish pond is necessary in order to determine its suitability for fish production.  One of the problems facing fish farming is inadequate monitoring of water used in fish pond and this has posed serious threat to survival and growth of fish. Constant monitoring of the water from fish farm through physicochemical analysis is one of the main solutions to this problem. This study is aim at examine the seasonal variation in physicochemical properties in water samples from Osagin Fish farm in Akinyele Local Government, Ibadan, Oyo State. Water samples were collected under aseptic condition at a month interval for a year period. Physicochemical properties were assessed by standard methods. The water temperature ranged from 23.67 to 30.00oC,  Air temperature ranged from 24.00-33.67oC, the surface pH ranged from 6.73 to 8.80 mg/L, Dissolved oxygen 4.87-8.07 mg/L, Electrical conductivity of the surface water varied from 6.53 µS/cm to 15.23 µS/cm, Total Dissolved Solids ranges from 15.90-52.27 mg/L, Total hardness ranged between 28.3 and 64.67 mg/L, Total Alkalinity varied from 29.67 to 49.67 mg/L, Phosphate ranged from 0.16 to 1.95 mg/L, Chloride ranges between 8.50 to 10.72 mg/L, Nitrate varies from 1.24 to 3.97 mg/L, Calcium ranged from 18.67 to 84.67 mg/L, Sodium ranges between 22.94 to 26.92 mg/L, Magnesium varied from 1.08 to 1.38 mg/L, Potassium ranges between 1.01 to 1.09 mg/L and Iron varied between 0.29 and 0.59 mg/L. The findings of seasonal variation in physicochemical parameters of water samples showed the results were mostly within the required regulatory requirements standards limits. The analysis showed that the water sampled in the fish ponds is suitable for fish and other aquaculture production.  
3 Review of the Application of Artificial intelligence in Sign Language Recognition System , Oyeniran, Oluwashina A.1, Oyeniyi, Joshua O.2, Sotonwa, Kehinde A.3, Ojo, Adeolu O.4
Communication is the process human beings understand what is said to them and the way they say or express their thoughts, needs and feelings to other people and this is mostly through speech. Although, when it comes to people with hearing impairment, sign language is inevitable. Thus, sign language is the most natural and effective way for communicating among deaf and other people. This study reviewed various schemes in the application of AI in the recognition and interpretation of sign language for machine and human understanding. This study revealed that numerous researchers have proposed and implemented diverse computer and android based application to aid learning and teaching sign language while others developed numerous machine learning algorithms and frameworks to foster sign language recognition system. Thus, this study established that artificial intelligence has greatly developed the teaching, learning and communication with sign language and obviously, artificial intelligence will be capable to resolve the future challenges that may arise in that regards.  
4 Techniques and Assessment of Lean Manufacturing Implementation: An Overview , A. A. Adel 1, 2 *, A. M. Badiea 2 and M. K. Albzeirat 1
          Lean manufacturing is absolutely required for distinct industries to create a competitive industrial standard. Therefore, Lean manufacturing became a standard manufacturing mode of the 21st century. Lean manufacturing could have various corresponding synonyms for example lean management and Lean production. It implicates techniques and tools to minimize non value-added activities from the customer point of view. Waste (Muda) is a serious problem in the industry; it creates non value-added services and poor quality of the product. Waste has seven types which can totally or individually occur in the industry that are transport, inventory, motion, waiting, over-production, over-processing, and defect. Using lean tools and techniques all several wastes can be eliminated. Hence implementing the lean manufacturing system is becoming a core competency for any type of organization to sustain.  This paper aims to conduct a quick review of Lean principles, the most commonly used Lean techniques, and Lean assessment. In order to obtain the goals of this work, the previous literature has been examined and the most important lean tools applied in the process of conversion to lean in companies and lean assessment have been also identified. This investigation elaborates that there is an obvious difference in the assessment methodologies according to many factors including the size of the companies, type of companies and the main objective of the assessment.  
5 Intelligent Medical Companion using Internet of Things  , Ahmad Khalaf Alkhawaldeh 1, Rawia Alkhawaldeh 2, Adeeb Ibrahim 2
Improvement in quality of health and medicine has become of paramount importance. The solution to this problem requires a wearable device for continuous monitoring for the patient. As a result, Medical companion was the best choice for the patient who suffers Arrhythmia due to its low-cost and efficacy to save the life of the patient. Moreover, this system is able to deliver reliable heartbeat and body temperature data to a user in a real-time, with a smart mobile application. This system mainly consists of MAX30100 and LM35 that detect heart rate and temperature of the human respectively. The output of these sensors is given to the esp32 section, which runs an Arrhythmia algorithm, which is already programmed, into it. If an abnormal heartbeat is detected, then it activates the alert in the mobile application. This mobile application will automatically send an alert message for the emergency centre and the patient's caregiver; thereby the life of the person can be saved.  
6 Software Bug Prediction Using Static Analysis with Abstract Syntax Trees   , Hisham Abdullah Bin Ateya 1, Saeed Mohammed Baneamoon 2, 3
Predicting software bugs in the early stage of the software development life cycle had some challenges, such as generating test data that had been used into the test, and exploring the method paths. This paper aims to explore the importance of using and applying abstract syntax trees (AST) with static program analysis in software testing to predict the software bugs that can be found to increase software quality and reduce the time required for discovering the software bugs and money cost by automating the unit tests. To achieve these goals, a new approach proposes to identify the potential bugs in the source code for the method under test by constructing an abstract syntax tree model for the method, then traversing the tree and exploring all paths to find the bugs. Hence, Smart Unit Tests are generated accurately to cover all possible executions paths for the tested method. At the end, the proposed approach uses static analysis, is able to predict all kinds of static bugs and generates the minimal suite of unit tests which are able to cover all the possible execution paths for the tested code. This indicates that the proposed approach achieves good results compared with other techniques regarding the type of bugs that can be predicted as well as the number of generated unit tests that are required to test the code.
7 Empirical Design Framework for Development of Convolutional Neural Network Based Model , S. O Subairu1, J. K Alhassan2, S.M Abdulhamid3, J.A Ojeniyi4
Convolutional Neural Network (CNN) has been described by most researchers as the best when it comes to image classification problems. This Neural Network is made up of high sensitive hyperparameters, such  that if not properly design could lead to model misclassification and such returns high false positive (FP) and high false negative(FN). In other to solve this problem, this research proposed and developed design frameworks that mitigate this identified problem when it comes to image classification model using a Convolutional Neural Network.  
8 Bimodal Biometric Recognition System Based On Score Level Fusion , Joshua Oyeniyi 1, Oluwashina Oyeniran 2
Biometric system have emerged over the last decade as the most effective method for recognizing individuals and have considerably drawn attention for its various potentials in many applications because of its efficiency in authentication.  Unimodal biometric system which uses single biometric trait lacks operational advantages in terms of performance and accuracy. The limitations of unimodal biometric system can be overcome by combining two physiological or behavioral traits to form a bimodal recognition system in ensuring efficiency and effectiveness in identification and verification of individual. In this paper, we developed a face-iris bimodal biometrics recognition system based on score level fusion using Support Vector Machines (SVMs). The system has a recognition accuracy (RA) of 97.9%, false acceptance rate (FRR) of 1.3% and false rejection rate (FAR) of 0.8%.  
9 Comparative Analysis of Weighted Round Robin and Fair Queuing Scheduling Algorithms for the Quality of Service Assurance using Transmission Control Protocol (TCP) as Traffic Agents. , Ojo, Adeolu O1   Oyeniran, Oluwashina A2 and Bakare Oluwatimileyin S3
This paper presents comparative analysis of scheduling algorithms: Weighted Round Robin and Fair Queuing using throughput, fairness rate, loss rate and delay as performance metrics for quality of service assurance. This work designed a topology to implement the two scheduling algorithms using Network Simulator-2 (NS-2) installed in a Linux operating system. Thirteen nodes were created for the topology to represent the eight sources, three edge routers, one core router and one destination. The simulations were run several times to arrive at the results. Based on the simulation results, it was observed that in terms of the three out of the four performance metrics: Throughput, Fairness Rate and Loss Rate; Weighted Round Robin scheduling algorithm was better than fair queuing scheduling algorithm in the internet using transmission control protocol (TCP) as traffic agent but reverse was the case in terms of delay as performance metric.  
10 Exploring the Web Application Frameworks Using Orchard Core - A Case Study  , Hisham Abdullah Bin Ateya 
This paper aims to explore the web application frameworks including their importance in web development. With the emergence of modern web development technologies and related web application frameworks, many web developers started using them because they have many advantages, such as modularity, security, productivity and much more. Although such frameworks are complex and required a learning curve, but they are very handy for developing of medium and large applications. In this paper, Orchard Core has been chosen as a case study to illustrate the web application framework features.
11 Electrochemical Sensors and Determination for Heavy Metal by Rotating Disk Platinum Electrode and Chronoamperometric Method , Ahmad Khalaf Alkhawaldeh1, Ayat Alzawahreh2, Rawia Alkhawaldeh 3
Pollution by heavy metals is one of the most severe environmental issues that threaten global sustainability. This review presents a recent advance in electrochemical sensors for heavy metal detection Rotating Disk Platinum Electrode are discussed. This study on the production of a modern natural water electrochemical antimony (II) and cupper (II) test include the use of platinum electrode. Antimony and cupper were pre-concentrated on the modified electrode surface and adsorbed to the surface, oxidizing at E = 540 mV and E = 85 mV, respectively. After 20 min of accumulation, time the best-defined anodic peak was obtained of surface. The precision was tested by carrying out chronoamperometric measurements at a concentration of Sb+2 and Cu+2 8.5x10-8 M and 9.5x10-7 M, respectively.  
12 Photons Shower to Disinfect Raw Nourishment before Gasp , Saddam Husain Dhobi
Treating the raw fruit and vegetable with UV to visible energy photon before eating, kill external bacteria and virus attached on the surface of fruit and vegetable. This technology help to make eatable goods free from bacteria, virus, and germs without any side effect on fruits and the person who consume them. Numbers of pesticide, germicide, insecticide etc. are used to kill these bacteria, virus and germs but these are the chemical with affect our health both directly and indirectly. They also cause physical and chemical change in fruits or vegetables that they treat, but such change is not take place on treating fruits or vegetable with photons energy UV to visible.  
13 Data Hiding Enhancement in Arabic Text , Abdulaziz Saleh Al-Dini 1, Naziha Mohammed Al-Aidroos 2, Khalid Q. Sha’Afal 3
Recently, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information, for this purpose, steganography is usually used to send secret information to their destination using different techniques. The aim of this article is to provide a new text steganography method. Hidden information in text files is difficult to discover as text data has low redundancy in comparison to other mediums of steganography. Hence, we use an Arabic text to hide secret information using a combination of Unicode character's zero-width-character (ZWC), zero-width-joiner (ZWJ) and pseudo-space (PS) in the proposed algorithm. The experimental results show increasing in hidden data capacity per word in comparison to the recently proposed algorithms. The major advantage of our proposed algorithm over previous researches is the high visual similarity in both cover and stego-text that can reduce the attention of intruders.  
14 Variable Rounds Block Cipher Algorithm Design , Louay Flaieh Hasan1, Amani Ali Elmetwaly Ali Ibrahim2, Syed Zulkarnain Bin Syed Idrus3
Feistel algorithm is a design model from which many different block ciphers are derived. DES is just one example of a Feistel Cipher. A cryptographic system based on Feistel cipher structure uses the same algorithm for both encryption and decryption. In each round, the right half of the block, R, goes through unchanged. However, the left half, L, goes through an operation that depends on R and the encryption key. In the proposed algorithm the left half L and the right half R both are goes through an operation depends on the round encryption key and L, R thus both L and R goes through changed in each round, this leads to possibility use one round only to encrypt/decrypt block of input data. The second   Kirchhoff’s principle stated that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. Virtually all the contemporary encryption algorithms such as DES, AES, etc. are applied this principle. This principle leads means that message depends solely on the security of the secret encryption key. The proposed algorithm designed according to this principle. In modern era, cryptosystem needs to cater to users who are connected to the Internet. In such cases, using a secret algorithm is not feasible; hence, Kirchhoff’s principles became essential guidelines for designing algorithms in modern cryptography. The Feistel algorithm, such as DES, in real implementation instead of using the whole encryption key during each round, a round-dependent key a subkey is derived from the encryption key. This means that each round uses a different key, although all these subkeys are related to the original key. However, in the proposed algorithm each round subkey is independent and unrelated to another different subkey, this making the proposed system stronger, more secure and makes it more difficult to attack. The proposed algorithm design, both plaintext and cipher text block size equal to 192-bit distributed over six groups of 32 bits for each and round subkey size of 176 bit (22 byte) for each round, because the left and right half of input block goes changed through an operation by apply two  encrypting functions one for left half and the second for right half  that takes two input for each, the round key K as well as R and L, hence the variable number of rounds from 1 and above possible to use.  
15 Frequency Attack Immunity: Flat Distribution Substitution Encryption System , Louay Flaieh Hasan 1, Amani Ali Elmetwaly Ali Ibrahim 2, Syed Zulkarnain Bin Syed Idrus 3
Substitution encryption techniques is still used today in modern encryption systems, and the main problem of this type of encryption system is its security weakness, which is caused by the inconsistent distribution of the alphabetical characters that make up the alphabet in the ciphertext, which is a direct reflection of the statistical distribution of the corresponding plaintext. In this paper, the standard symbols in the ASCII code have been used as a plaintext alphabet, and then each of these 256 symbols has been substituted with another symbol from the same table to produce a new alphabet for coding, and then we change the symbols that represent part of the file data from the file type to the corresponding form of the symbols in the new encoded alphabet. This process makes the distribution of symbols randomly in a file, and thus the cryptanalyst would not be able to take advantage of these random statistical properties or methods that depend on these statistical methods to break the new code generated by the proposed system.  
16 Electrochemical Analysis of Heavy metal by Cyclic Voltammetry Method , Ahmad Khalaf Alkhawaldeh 1
Bismuth and Bismuth oxides are well-known electro-catalysts in fuel cells systems; they are usually used as anodic materials for the oxidation of low molecular weight alcohols. The utilization of BiO2 and MnO2 as catalysts in the pharmaceutical analysis is analytical method for the determination of heavy metal antibacterial agents in Pharmaceutical Dosage form is developed. The method is based on the voltammetric determination of heavy metal using Bidified platinum electrode by Bismuth oxide. The two components are oxidized at the Bidified electrode surface with the development of current that is linearly proportional to their concentrations in the range of 7.04*10-7- 1*10-3 M heavy metal. The oxidation reaction of the two components is pH-dependent, in which the buffer used is Britton-Robinson at pH = 7.00 where maximum peak current and maximum peak separation is obtained. The regression factors obtained from the calibration curves are 0.9812. The method of analysis was validated, where the limit of detection (LOD) and the limit of quantitation (LOQ) were calculated to be 1.44*10-4 M, 4.36*10-4 M and 1.27*10-4 M, 3.84*10-4 M respectively, The percentage recovery of both components was also calculated to 77 % for heavy metal.  
17 The research, analysis and empirical design of hydrodynamics system for generating electrical energy from flowing water moving at 3mph , Edwin Osayuki Igbinosun1, Prof. D. Ogunjemilusi2, Dr Funmilola Omotayo3
This research focuses on the basis to verify a concept; whether the water motion in a slow flowing river of speed above 2MPH (2 miles per hour) is able to be utilized and converted into sufficient electrical energy output or not. In this concept, the water motion turns a specially design and built turbine blades, which transmit rotational motion to the shaft, which is connected to a speed increaser (bevel gearbox – used to increase the speed). The other end is connected to a DC generator using a prime mover; this changes the kinetic energy of the shaft to electrical energy produced by the generator. The energy is either directly used or stored in a battery system for off-pick hour use.  The system is able to provide an economical way to produce electrical energy to small communities without affecting the environment and reduce reliance on fossil fuel.  
18 E-learning: significance on federal unity schools students’ in Nigeria amidst covid-19 lockdown , Afeez A. SOLADOYE1
E-Learning has become the only option left to ensure Academics activities are not totally put on hold due to the crisis of COVID-19 pandemics, which led the lockdown Countries’ Economy and Social activities. Many countries have adopted the use of online class to ensure the continuous learning of students during the Lockdown in which Nigeria was not left out of this innovative practice. Many online learning platform were used during this time like Zoom, YouTube, WhatsApp, and Edmodo among others. This study aims to study how this online learning practice really helped secondary school students in Nigeria during the lockdown and after, the level of their participation and involvement in E-Learning, how it made them to have access to the digital world and their view about the implementation of E-Learning. A survey of 200 Secondary school students from some Federal unity schools in Nigeria were randomly selected to obtain the primary data with the use of Google Form, some were shared through WhatsApp, while some were filled within the school after resumption. Descriptive analysis was adopted to analysis the data. The findings show that many students took part in the E-Learning during the lockdown and this exercise made them to judiciously make use of their time and the online classes really helped them as they were able to easily understand what they were being taught in class after resumption because they have had ideas on the topics as they have been taught in their online classes, though some students did not participate due to their involvement in Home lesson, lack of digital devices to access the internet or lack of data subscription. The findings indicate students did not waste their lockdown period but really got engaged academically and have wide exposure to the digital world and they are ready to participate if E-Learning is to be incorporated as Holiday lesson or anything.  
19 Study and Analysis of Pb Acid and Li Ion Battery for Transport, Safa Tempo in Kathmandu Valley , Subash Gautam1, Saddam Husain Dhobi2
The objective of this work is to compare the income generation and discharging nature of lithium ion batteries and lead acid batteries which is powered safa tempo by lithium ion battery of 1set Sinopoly LiFePO4, 76.8 voltage, 300Ah (Safa Tempo No. 3582) and Trojan T125, lead acid batteries of a set of 72V, 240Ah (Safa Tempo No.3578) for a loop of 9km loop (RNAC-MaharajGunj-RNAC) in Kathmandu Valley. In our research work, we consider 1set lithium ion batteries and 2 set of lead acid batteries, fresh batteries. On comparison of income for same loop on single charge of 1set lithium and 2set lead acid the income generated by lead acid is Rs.541NPR per day is greater than lead acid batteries, moreover the number of loops covered by lithium ion is greater than lead acid batteries i.e. lithium ion cover 1 more loops than lead acid. The discharging nature of lead acid with loops is decrease continuously while for lithium ion is constant for some initial loops and decrease constantly with loops while the nature of state of charge is same with loops. Also the price of lead acid batteries is 33% of lithium ion batteries.
20 Make the Educational Decisions Using the Analytical Hierarchy Process AHP in the Light of the Corona Pandemic , Louay Flaieh Hasan 1, Amani Ali Elmetwaly Ali Ibrahim 2, Syed Zulkarnain Bin Syed Idrus 3
The Analytical Hierarchy Process for Decision-Making is one of the oldest and most well-known methods of decision- making of a complex nature, similar to the current global circumstances, with the widespread spread of the Covid-19 virus and the failure of the world to control its spread and its impact, which has impacted almost all sectors of the world, including the education sector. This paper came to Identify educational alternatives and to identify criteria that could affect them in the light of this virus. The process of hierarchical review was used to make a major contribution to decision-making by determining the priority of these educational alternatives. A set of personal interviews was conducted with a group of decision-makers, selected educational experts and influencers in the field of education, after analyzing the data collected from those interviews using the NVIVI software tool, then later that, a data collection tool was designed to determine the weights of alternatives and criteria that are key inputs to the AHP. The AHP used to identify the ranks of those alternatives in order to arrange it, according to the priority, that contribute to making the decision better and easier.
21 Internet of things in knowledge management in e-government , Mohammad Ali Alqudah 1, Leyla Muradkhanli2
Knowledge has become the most important resource to distinguish today's organizations, including the e-government, which has realized the importance of adopting the concept of knowledge management to activate the knowledge it possesses, through the processes associated with the production, organization, and sharing of this knowledge, in a way that contributes to improving service activities in these institutions. With the emergence of advanced applications of the concept of the Internet of Things, in addition to the development of information and communication technologies, it can be used in knowledge management because the Internet of things technologies can link physical entities and support interaction with the human element. From this standpoint, this study seeks to highlight the role of Internet of Things applications in supporting knowledge management activities in e-government and thus improving its services. To achieve this goal, this study adopts the descriptive approach, through the investigation and analysis of the intellectual output published in the countries, intending to extrapolate the areas of the relationship between the Internet of Things and knowledge management activities in e-government. The results of the study indicated that the e-government has benefited from the Internet of things in tracking all the physical and intangible entities present in these institutions and determining their locations in the event of their loss or displacement from their specific places, as it has become able to monitor the numbers of visitors and determine the peak hours and the most used sources and thus these institutions were able By providing fast, interactive services that respond to the aspirations of the beneficiaries. This study recommends that various information institutions take the initiative to take advantage of the Internet of Things applications to meet the renewable and changing needs of their beneficiaries.
22 Study and Analysis of Pb Acid and Li Ion Battery for Transport, Safa Tempo in Kathmandu Valley , Subash Gautam1, Saddam Husain Dhobi2
The objective of this work is to compare the income generation and discharging nature of lithium ion batteries and lead acid batteries which is powered safa tempo by lithium ion battery of 1set Sinopoly LiFePO4, 76.8 voltage, 300Ah (Safa Tempo No. 3582) and Trojan T125, lead acid batteries of a set of 72V, 240Ah (Safa Tempo No.3578) for a loop of 9km loop (RNAC-MaharajGunj-RNAC) in Kathmandu Valley. In our research work, we consider 1set lithium ion batteries and 2 set of lead acid batteries, fresh batteries. On comparison of income for same loop on single charge of 1set lithium and 2set lead acid the income generated by lead acid is Rs.541NPR per day is greater than lead acid batteries, moreover the number of loops covered by lithium ion is greater than lead acid batteries i.e. lithium ion cover 1 more loops than lead acid. The discharging nature of lead acid with loops is decrease continuously while for lithium ion is constant for some initial loops and decrease constantly with loops while the nature of state of charge is same with loops. Also the price of lead acid batteries is 33% of lithium ion batteries.
23 Make the Educational Decisions Using the Analytical Hierarchy Process AHP in the Light of the Corona Pandemic , Louay Flaieh Hasan 1, Amani Ali Elmetwaly Ali Ibrahim 2, Syed Zulkarnain Bin Syed Idrus 3
The Analytical Hierarchy Process for Decision-Making is one of the oldest and most well-known methods of decision- making of a complex nature, similar to the current global circumstances, with the widespread spread of the Covid-19 virus and the failure of the world to control its spread and its impact, which has impacted almost all sectors of the world, including the education sector. This paper came to Identify educational alternatives and to identify criteria that could affect them in the light of this virus. The process of hierarchical review was used to make a major contribution to decision-making by determining the priority of these educational alternatives. A set of personal interviews was conducted with a group of decision-makers, selected educational experts and influencers in the field of education, after analyzing the data collected from those interviews using the NVIVI software tool, then later that, a data collection tool was designed to determine the weights of alternatives and criteria that are key inputs to the AHP. The AHP used to identify the ranks of those alternatives in order to arrange it, according to the priority, that contribute to making the decision better and easier.
24 Internet of things in knowledge management in e-government , Mohammad Ali Alqudah 1, Leyla Muradkhanli2
Knowledge has become the most important resource to distinguish today's organizations, including the e-government, which has realized the importance of adopting the concept of knowledge management to activate the knowledge it possesses, through the processes associated with the production, organization, and sharing of this knowledge, in a way that contributes to improving service activities in these institutions. With the emergence of advanced applications of the concept of the Internet of Things, in addition to the development of information and communication technologies, it can be used in knowledge management because the Internet of things technologies can link physical entities and support interaction with the human element. From this standpoint, this study seeks to highlight the role of Internet of Things applications in supporting knowledge management activities in e-government and thus improving its services. To achieve this goal, this study adopts the descriptive approach, through the investigation and analysis of the intellectual output published in the countries, intending to extrapolate the areas of the relationship between the Internet of Things and knowledge management activities in e-government. The results of the study indicated that the e-government has benefited from the Internet of things in tracking all the physical and intangible entities present in these institutions and determining their locations in the event of their loss or displacement from their specific places, as it has become able to monitor the numbers of visitors and determine the peak hours and the most used sources and thus these institutions were able By providing fast, interactive services that respond to the aspirations of the beneficiaries. This study recommends that various information institutions take the initiative to take advantage of the Internet of Things applications to meet the renewable and changing needs of their beneficiaries.
25 Study on the effect of fused deposition modelling (FDM) process parameters on tensile strength and their optimal selection , Amanuel Diriba Tura1*, Hana Beyene Mamo2, Dommeti Kamalakara Rao3
Additive manufacturing (AM), also known as 3D printing, is a transformative method to industrial fabrication that enables the creation of lighter, stronger parts and systems. Additive manufacturing uses data computer-aided-design (CAD) software or 3D object scanners to direct hardware to deposit material, layer upon layer, in precise geometric shapes. Fused deposition modeling (FDM) is one of the mainly used AM techniques for fabricating prototypes and functional parts in common engineering plastics. At various process parameters, mechanical properties of printed parts are significantly changed. Therefore, it is important to examine the influence of printing parameters on quality of printing part. This article provides an experimental investigation for the quality analysis of process parameters on printed parts using fused deposition modelling (FDM) in terms of tensile strength. The experiment were carried out using Taguchi’s L9 orthogonal array technique by varying process parameters such Infill density, Infill pattern and Layer thickness using Acrylonitrile butadiene styrene (ABS) print material. Taguchi method are applied for the Multi-objective optimization of characteristics of Printing parts. ANOVA, S/N ratio, and 3D surface plot   were used for analysis of experimental result and study the effect of process parameters. Results of Taguchi optimization indicates that the optimal FDM parameters for Tensile strength (UTS) are the layer height at 0.19mm, the Infill rate at 45 %, Build speed at 180 mm/min and the build temperature at 240 ºC which gives maximum UTS =39.094 MPa at maximum value of S/N ratio = 31.8422.
26 Design and Deployment of Optical Fiber Network at Atomic Energy Centre, Dhaka , Osman Goni1
Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of infrared light through an optical fiber. The light is a form of carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling when high bandwidth, long distance, or immunity to electromagnetic interference is required. This type of communication can transmit voice, video, and telemetry through local area networks or across long distances. Many telecommunications companies to transmit telephone signals, Internet communication, and cable television signals use optical fiber. Researchers at Bell Labs have reached a record bandwidth distance product of over 100 petabit × kilometers per second using fiber optic communication. To fulfill the current requirements of Atomic Energy Center, Dhaka considering its smooth operation of high-speed internet service, optical fiber based network is the state-of-the-art network solution. An optical fiber network design refers to the specialized processes leading to a successful installation and operation of a fiber optic network, which includes determining the type of communication system(s), which will be carried over the network, the geographic layout, the transmission equipment required and the fiber network over which it will operate. Atomic Energy Centre, Dhaka (AECD), considered, as the pioneer institution of the Bangladesh Atomic Energy Commission (BAEC) is now one of its research establishments located at the core of Dhaka city was established in 1961 to carry out research and development activities in the field of Nuclear science and technology for peaceful purposes. For that, here internet is essential. Therefore, optical fiber network design and deployment at Atomic Energy center is very important.  
27 Numerical Investigation of the Aerodynamics Performance of Hybrid Icewind-Darrius Turbine , Kadhim H. Suffer1, Zahraa S. Jabar2
The low output torque is considered one of the most important disadvantages of the vertical axis wind turbine (VAWT) having the Darrieus airfoil blades, design optimization to overcome this problem, modify the blades of the  VAWT of the Darrieus type by combining it with Icewind blades as the efforts to complement the aerodynamic performance of the turbine. This paper aim is to simulate numerically by using CFD technique with ANSYS 19 software to investigate the aerodynamics performance of the modified model of VAWT by adding three small Icewind blades to the main structure of the three blades Darrieus H-type turbine to increase its overall performance by reducing self-starting ability that associated with increasing the low performance and low rotational speed that associated with the Icewind blades turbine (SST) K-Ω turbulent model is used in this simulation, which is better than the other turbulence models available from a researcher, the finding results from the numerical simulation show that the drag coefficient (Cd), static pressure drop, and starting torque are increased on the positive side and decrease on the negative side of the turbine rotor, the reduction of airflow resistance on the negative side of the turbine blades helps increase the rotation of the turbine rotor, and then turbine output power increases, the results are found to be similar in nature to those reported for VAWT having different blade designs .  
28 Natural Composites Reinforced Unsaturated Polyester , Sarraa A. Mansor 1, Amer H. Majeed2
In this investigation, polymer matrix composites (PMCs) have been prepared by using unsaturated polyester resin with (sisal and cotton) fiber. These fibers have been added to unsaturated polyester individually and mixed as a hybrid. Molds were produced by hand from silicon rubber by ASTM standards. Different ratios of these fibers were added separately as (3%, 4.5%, 6%, and 7.5% wt.) with (5 mm) length and, the fibers were then blended in (5) mm long (3.75% wt. sisal, 3.75% wt. cotton) to unsaturated polyester and then the tensile strength, Young modulus, elongation percentage at the break, flexural strength, and maximum shear strength tests were carried out. The findings revealed that these properties improve as the weight fraction for both fiber types concentration ratios increases, peaking at (7.5%). While the concentration of these fibers was raised, the elongation percentage at break went down. All composite specimens reinforced with sisal fibers had the lowest elongation percentage at the break and the highest tensile strength, Young modulus, flexural strength, and max. shear strength as compared to composite specimens reinforced with cotton fibers, which were (1.512%, 48.44 MPa, 6.240 GPa, 120 MPa, and 6 MPa) at 7.5% respectively.  
29 Technology patterns in Nanochemistry Based on GII Indicator , Ahmad Khalaf Alkhawaldeh 1
Trends focused on the Global Innovation Index (GII) as a measure for progress of nanochemistry. This paper provides projections of recent developments in the word in nanochemistry based on the Global Innovation Index as a predictor for certain Arab countries. The GII is an annual ranking of countries by its ability and performance in innovation and is calculated on a basic average from five and two pillars in two sub-indexes, the Innovation Input Index and the Innovation Output Index. Each pillar represents a trait of creativity and consists of up to five measures, with a weighted average formula for measuring their ranking. In 2008, the GII rose to 36.3 in 2016 from 0.5. The GII is smaller than the GII in Arabic countries worldwide. During the years 2013-2016, the worldwide GII was increasing while for the same period, for Arabic countries, this decline could be explained by economic and industrial wars in the Arab region.  
30 The Effect of Crystallinity on the Thermal Expansion of Polymers , Noor S. Zaki 1*, Tawfeeq Wasmi M. Salih 2
This research aims to investigate the direct effect of the crystallinity on the values of thermal expansion coefficient for selected polymers. The study has included many thermoplastic materials, namely: polyoxymethylene (POM), high-density polyethylene (HDPE), low-density polypropylene (LDPE), polypropylene (PP), polyamide (PA), and polyethylene terephthalate (PET). The degrees of crystallinity ranged from high-values (60-70%), mid-values (30-40%) and low-values (10-20%). The work has been done theoretically and experimentally. Theoretical work has used mathematical functions extracted from reliable empirical relationships. The experimental work has included: manufacturing the specimens; specifying the cooling procedure to get the required degree of crystallinity; measuring the coefficient of thermal expansion for different polymers at various conditions; finally, the data was analyzed and introduced the experiences obtained from the investigation. In general, theoretical values and experimental data were both behave similarly concerning the variation of thermal expansion with the degree of crystallinity. The results show that by increasing the degree of crystallinity, the thermal expansion of the polymer has increased by 30-50%.  
31 Study The Mechanical Properties of Engineered Cementitious Composites Containing High-Volumes of Pozzolanic Material  ,        Israa B. Mossa 1,  Raad M. Fenjan 2,  Mohammed J. Kadhim3
Engineered Cementitious Composites (ECC) containing high volumes of copper slag  (HVCS) as a partial replacement of Portland cement (PC) of different replacement levels (0.8, 1.2, 1.6 and 2) by weight of cement,  incorporating with graphite (ECC-GR) or with polyvinyl alcohol (ECC-PVA) powders have been studied. Physical properties (bulk density, water absorption and ultrasonic pulse velocity [UPV]), furthermore, mechanical properties (splitting tensile strength and compressive strength), were measured at different curing ages (7, 28 and 90) days. For comparison control mixture was produced, which was free from any mineral additives. The results given, when utilizing of copper slag (CS) as a replacement material of Portland cement in cement mortar with appropriate proportions (0.8) can achieve good sustainable material as well as gain the consistency and mechanical strength of ECC. While, when the replacement ratio was increased up to (2.0), the (ECC) mortar becomes heterogeneous and crumble subsequently that lead to giving poor mechanical and durability properties of mortar. Utilizing of CS as a cement replacement in mortars  the appropriate level, leading to decreased PC consumption as well as providing an economic and friendly environmentally advantages.  
32 Experimental Study of a Hybrid Darrius-Icewind Vertical Axis Wind Turbine  , Kadhim H. Suffer1, Zahraa Salih Jabar2
The present work aimed an experimental work to study the performance of a Hybrid (Darrius-Icewind blades) Vertical Axis Wind Turbine (DIVAWT).  Darrius rotor type S1046 airfoil is hybrid with an Icewind blade rotor in one configuration of a  three blades VAWT for the propose to solve the low starting torque of the Darrius rotor. Experimental work was carried out using low speed open flow wind tunnel for two models; first three blades of Darrius airfoil, and second for hybrid Darrius with Icewind blades.  The finding results from the experimental tests show that the performance of hybrid (Darrius rotor and Icewind rotor) is higher than using Darrius rotor alone. This result helps to give the  better performance (power coefficient and the  electrical power  produce) from the turbine compared with that of Darrius rotor alone. The obtained results show good agreement with that available published experimental work.  
33 Cyclic voltammogram analysis of the environmental aspects of the use of ferrocenyl carbinols  ,  Ahmad khalaf alkawaldeh1
Ferrocene and its derivatives have ecologically effective antidetane properties. In this regard, ferrocene reacts with cyclic ketones and ferrosenylcarbinols are synthesized. It should be noted that ferrocene enters into electrophilic reactions and the process takes place in an acidic environment. In addition, the yield of the new product was small compared to the reactions of ferrocene with non-cyclic ketones. This is due to the spatial structures of molecules. The elemental analysis of obtained compounds was carried out; the structures were researched by cyclic voltammograms and Chronoamperometric.  
34 THE RESEARCH, ANALYSIS AND EMPIRICAL DESIGN OF HYDRODYNAMICS SYSTEM FOR GENERATING ELECTRICAL ENERGY FROM FLOWING WATER MOVING AT 3MPH , Edwin Osayuki Igbinosun 1, Prof. Ogunjemilusi 2,*, Funmilola Omotayo 3
This research focuses on the basis to verify a concept; whether the water motion in a slow flowing river of speed above 2MPH (2 miles per hour) is able to be utilized and converted into sufficient electrical energy output or not. In this concept, the water motion turns a specially design and built turbine blades, which transmit rotational motion to the shaft which is connected to a speed increaser (bevel gearbox – used to increase the speed). The other end is connected to a DC generator using a prime mover, this changes the kinetic energy of the shaft to electrical energy produced by the generator. The energy is either directly used or stored in a battery system for off-pick hour use. The system is able to provide an economical way to produce electrical energy to small communities without affecting the environment and also reduce reliance on fossil fuel.  
35 Microstructure, Strength, and Physical Properties of Metakaolin-Based Geopolymer Mortar , Haneen Salim1, Layth Abdulbari Al-Jaberi 2,Yasir Khalil Ibrahim3
The major starting elements for the  geopolymer matrixes synthesis were  alkali activators and aluminosilicate materials , with the former being kaoline, fly ash or slag, and the latter having  sodium silicates (Na2SiO3) and sodium hydroxide (NaOH)  respectively. Metakaoline was used as one of the raw materials in the geopolymerization process  in this research .The influence of NaOH concentration and alkaline-liquid ratio on the characteristics of metakaoline-based geopolymer products will also be discussed in this article. Geopolymer mortar cubes sized 50mm x 50mm x 50mm .The alkaline liquid to metakoline ratio is 0.6, and the  temperature of cure is kept at 70°C for 5h in  oven with hot air , followed by 28 days in the sun.The effect of NaOH concentrations ranging from 8 to 14 M and alkaline-liquid ratio are (2 and 2.5) .Finaly we replaced 20%of metakaolin with fly ash to study influence of fly ash and compare between tow raw material.Mechanical testing such as compressive strengths and flexural strengths And NDT such as UPV,water absorption.thermall conductivity and   Microstructural investigations have been used to describe it, such as (XRD) and (SEM) are used to estimate GPMs.Based on the findings , the optimum NaOH concentration (14 M) at which geopolymer exhibits the best mechanical properties was determined based on the research findings  
36 ARABIC SIGN LANGUAGE TO TEXT AND SPEECH TRANSLATION USING CONVOLUTIONAL NEURAL NETWORK AND PYTORCH , Mogeeb A. Saeed 1, Mohammed Hashem Almourish 2, Aseel Najeeb Mohammed 3, Ashraf Qassem Al-Rashid 4, Mohammed Fuad Al-shehari 5
Hard of hearing people utilize use gestures communication to speak with each other and with the overall population. Particularly, when a consultation individual needs to talk with a hard of hearing individual, a translator is normally vital. Visual communication through signing acknowledgment is a quickly advancing field of PC vision research. In this exploration doing Create a work area application utilizes PC's webcam to decipher the Arabic communication via gestures, where the motions are caught to the Arabic letters and made an interpretation of them into text and transform the content into a voice. By using convolutional neural network (CNN). Convolution neural network is viable in handling PC vision issues and ready to find exceptionally required highlights when satisfactory preparing, where the profound convolutional neural network has been applied to the profound learning in the Python language with Pytorch innovation.  
37 Microstructure, Strength, and Physical Properties of Metakaolin-Based Geopolymer Mortar , Haneen Salim1, Layth Abdulbari Al-Jaberi 2,Yasir Khalil Ibrahim3
The major starting elements for the  geopolymer matrixes synthesis were  alkali activators and aluminosilicate materials , with the former being kaoline, fly ash or slag, and the latter having  sodium silicates (Na2SiO3) and sodium hydroxide (NaOH)  respectively. Metakaoline was used as one of the raw materials in the geopolymerization process  in this research .The influence of NaOH concentration and alkaline-liquid ratio on the characteristics of metakaoline-based geopolymer products will also be discussed in this article. Geopolymer mortar cubes sized 50mm x 50mm x 50mm .The alkaline liquid to metakoline ratio is 0.6, and the  temperature of cure is kept at 70°C for 5h in  oven with hot air , followed by 28 days in the sun.The effect of NaOH concentrations ranging from 8 to 14 M and alkaline-liquid ratio are (2 and 2.5) .Finaly we replaced 20%of metakaolin with fly ash to study influence of fly ash and compare between tow raw material.Mechanical testing such as compressive strengths and flexural strengths And NDT such as UPV,water absorption.thermall conductivity and   Microstructural investigations have been used to describe it, such as (XRD) and (SEM) are used to estimate GPMs.Based on the findings , the optimum NaOH concentration (14 M) at which geopolymer exhibits the best mechanical properties was determined based on the research findings.  
38  Study of VR Online class for education with estimating facial expressions using deep learning (System construction and first step experiment of VR online class) , Kaito Murauchi 1, Junji Sone 2*, Katsumi Yamada 2, Yoji Yasuda2
Online lessons, wherein students attend classes online in an environment with limited interactions among the instructor and students, has become prevalent. In this study, we developed a method for online learning that uses virtual reality (VR) to make online learning more immersive and interactive. We constructed virtual online lessons using VRChat. Furthermore, we considered the online determination of the student state to be important; therefore, we developed a facial expression recognition system for use during online VR lessons, using edge computing, OpenCV, and Python. We conducted an experiment by combining VR lessons in VRChat with real-time facial detection and verified the effectiveness of the VR lessons by comparing it with conventional online lessons. By comparing the results of the facial recognition and questionnaires, it was shown that students could concentrate more on the lesson content in the VR online lesson.  
39 The Basic Concept of Cyber Crime , Osman Goni1, Md. Haidar Ali2, Mr. Showrov3, Md. Mahbub Alam4, Md. Abu Shameem5
Modern world gives us many facilities. We can visit anywhere in the world by the help of modern invention. Sometimes Modern Invention creates crime. Cyber Crime is one of them Cyber Crime is a common phenomenon in the world. Cyber Crime is that group of activities made by the people by creating disturbance in network, stealing others important and private data, documents, hack bank details and accounts and transferring money to their own. Cyber Crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, Trafficking in child pornography and intellectual property, stealing identities, or violating privacy. The cyber crime and they its impacts over the society in the form of economical disrupt, psychological disorder, threat to National defense etc. Restriction of cyber crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Now a day’s Cyber crime is increasing day by day. People have been greatly suffering for it. It is not only creates human suffering but also put effect on it. So Cyber Crime is one of the major crimes done by computer expert.  This paper gives the Introduction of cyber crime.    
40  Study of VR Online class for education with estimating facial expressions using deep learning (System construction and first step experiment of VR online class) , Kaito Murauchi 1, Junji Sone 2*, Katsumi Yamada 2, Yoji Yasuda2
Online lessons, wherein students attend classes online in an environment with limited interactions among the instructor and students, has become prevalent. In this study, we developed a method for online learning that uses virtual reality (VR) to make online learning more immersive and interactive. We constructed virtual online lessons using VRChat. Furthermore, we considered the online determination of the student state to be important; therefore, we developed a facial expression recognition system for use during online VR lessons, using edge computing, OpenCV, and Python. We conducted an experiment by combining VR lessons in VRChat with real-time facial detection and verified the effectiveness of the VR lessons by comparing it with conventional online lessons. By comparing the results of the facial recognition and questionnaires, it was shown that students could concentrate more on the lesson content in the VR online lesson.  
41 Introduction to Cyber Crime , Osman Goni1
Modern world gives us many facilities. We can visit anywhere in the world by the help of modern invention. Sometimes Modern Invention creates crime. Cyber Crime is one of them Cyber Crime is a common phenomenon in the world. Cyber Crime is that group of activities made by the people by creating disturbance in network, stealing others important and private data, documents, hack bank details and accounts and transferring money to their own. Cyber Crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, Trafficking in child pornography and intellectual property, stealing identities, or violating privacy. The cyber crime and they its impacts over the society in the form of economical disrupt, psychological disorder, threat to National defense etc. Restriction of cyber crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Now a day’s Cyber crime is increasing day by day. People have been greatly suffering for it. It is not only creates human suffering but also put effect on it. So Cyber Crime is one of the major crimes done by computer expert.  This paper gives the Introduction of cyber crime.    
42 Abnormality of Air Temperature in the Early Decade over Lalitpur, Nepal , Purna Bahadur Rai1,3, Binod Poudel1,3, Bishal Gaire1,4, Anuj Paudel4, Gambhir Pande1,3, Madan Devkota1,3, Krishna Poudel1,3, Saddam Husain Dhobi1,2,3, Bibek Koirala1,2,3, Kuldip Paudel1,5, Kushal Dahal5
 The observation of temperature above Lalitpur was studied using the maximum air temperature at 12 PM and minimum air temperature at 3 AM. The data are taken from the Department of Hydrology and Metrology from 2011 to 2020. The observation, plot, and analysis for this work are based on an Excel plot. In addition, observation shows that the maximum air temperature was recorded in 2016 above Lalitpur up to 32.2 oC on April 29 and June 16, 2016). The minimum temperature was recorded up to -2.4 oC on January 9, 2013. The observation of temperature shows the fluctuation, this is because of several factors like clouds, air pollution, aerosol particles, rainfall, fog, seasonal variations, etc.  
43 Cyclic voltammogram analysis of the 3,3´- (1,4-phenylene) perchlorates  ,  Ahmad khalaf alkawaldeh1, Abdel Hadi Al Jafari1 
As a consequence of a three-stage synthesis from terephthalic aldehyde, a series of 3,3 '- (1,4-phenylene) perchlorates including  methyl, hydrogen,  acetyl,  bromio, methoxy and nitro groups (R =  Br,  H, Me). The matching formazans were reacted with formalin in dioxane in the presence of perchloric acid to produce tetrazin ium salts. Formazans were synthesized by reacting terephthalic aldehyde phenylhydrazone with ar ene diazonium tosylates in a DMF/pyridine combination.  The use of ar ene diazonium tosylates greatly simplified the separation and purification of formazans. The p henylhydrazone was produced in aqueous dioxane using the usual approach from terephthalic aldehyde and phenylhydrazine/hydrochloric acid. Individual f ormazans and tetrazinium perchlorates were isolated and characterized by elemental analysis, IR, NMR,  UV spectroscopy. The electrochemical reduction of tetrazinium perchlorates was investigated using cyclic voltammetry (CV).  Thus, all salts in the cathode region have two one-electron reduction peaks, which are connected to the sequential production of a radical cation and a biradical. It was discovered that donor substituents (R: OMe, Me) in the aromatic ring at position 1 accelerate tetrazinium cation reduction, whereas acceptor substituents (R: NO2, COMe,) inhibit this process.  On this premise, it was proposed that in the presence of donor substituents in the aromatic ring at position 1, the matching bis-verdazyl radicals should be easily generated. As a result, 3,3'- (1,4-phenylene) perchlorates are possible antecedents of symmetric biradical systems based on verdazyl radicals.