Preferred Language
Articles
/
5BcNjpEBVTCNdQwCjJXU
Survey of Coleopteran Insects on Alfalfa Plant
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jan 02 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Diagnostic COVID-19 based on chest imaging of COVID-19: A survey
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Biodiversity And Environmental Sciences
The use of asiamic pesticide and black pepper extracted to control the leaf miner Liriomyza trifolii on bean and natural enemies of insects
...Show More Authors

Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Nov 05 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF PLANT DENSITIES ON THE GROWTH AND YIELD OF SUNFLOWER Helianthus annuus L.: EFFECT OF PLANT DENSITIES ON THE GROWTH AND YIELD OF SUNFLOWER Helianthus annuus L.
...Show More Authors

A field experiment was conducted at the experimental field of botanical garden, faculty of science, university of Baghdad, in order to study the effect of plant density on growth and yield of two local cultivars of sunflower (Sin Althieb and Shumose). The densities used were 4.4 and 8.8 plant/m2. The results showed difference between cultivars in their agronomic traits and their yields. There was a significant increase in plant height and leaf area index by increasing the plant density, while head diameter, number of seeds and leaf area decreased. But the most significant effect was the increasing in yield and biological yield by increasing the plant density. There was an increase by 72% and 58% in the yield and 79% an

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Thu Apr 14 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study The Effect of α-amylase Inhibitors Isolated from Plant Sources on Some Mold.: Study The Effect of α-amylase Inhibitors Isolated from Plant Sources on Some Mold.
...Show More Authors

Activity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant: Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant
...Show More Authors

The surplus glycerol produced from biodiesel production process as a by-product with high quantity can be considered as a good source to prepare glycerol carbonate (GC) whereas with each 1000 kg from biodiesel obtains 100 kg from glycerol. Glycerol converted to glycerol carbonate over bio-char as a catalyst prepared by slow pyrolysis process under various temperatures from 400 ᴼC to 800 ᴼC. The char prepared at 700 ᴼC considered as a best one between the others which was manufactured to activate the transesterification reaction. GC have large scale of uses such as liquid membrane in gas separation, surfactants ,detergents , blowing agent , in plastics industry, in  Pharmaceutical industry and electrolytes in lithium batteries.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref