Theoretical Discussion of Electron Transport Rate Constant at TCNQ / Ge and TiO<sub>2</sub> System
...Show More Authors
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreThe current study was carried out to investigate the correlation of gene expressions of ADA1 and ADA2 genes with the development of autoimmune thyroid disease (AITD) in a sample of Iraqi females. One hundred patients with AITD and 80 controls were included. Quantitative real time polymerase chain reaction (qRT–PCR) was utilized for investigation of ADA1 and ADA2 gene expression among patients and controls. The correlation of age and body mass index (BMI) with AITD occurrence comparing with controls was studied. Based on the results of this study, there is high expression level of ADA1 and ADA2 genes in patients compared with healthy controls; also, the gene expression fold (2-ΔΔCT) of ADA1 and ADA2 among AITD patients was recorded and a
... Show MoreThis study is carried out on patients with type 2 diabetes mellitus to assess the lipid profile, malondialdehyde and glutathione. Our study is concerned with 51 (Iraqi Arab females) patients of type 2 diabetes mellitus compared with 31 control subjects unified in age, sex and ethnic background. Lipid profile is measured by using commercially available kits, while the serum MDA and glutathione levels are measured by means of sandwich ELISA test using commercially available kits. Serum MDA is significantly higher (P<0.001) while glutathione is significantly lower (P<0.001) in type 2 diabetic patients when compared to the control. The normal levels of MDA (3.82 ± 0.77n mol/ml) and GSH (2.23 ± 0.54 µg/ml) recorded for the non-diabetic female
... Show MoreA new ligand 2,3-dihydrobenzo [d] thiazole-2-carboxylic acid (L) has been prepared from the reaction of ortho amino phenyl thiol with dichloroacetic acid in mole ratio (1:1). It has been characterized by elemental analysis (C.H.N.), IR, UV- Vis.spectraand 1H, 13C-NMR. A new series complexes of the bivalent ions (Co, Ni, Cu, Pd, Cd, Hg and Pb) and the trivalent (Cr) have been prepared and characterized too. The structural has been established by elemental analysis (C.H.N.), IR, UV-Vis. spectra, molar conductivity, atomic absorption and magnetic susceptibility measurements. The synthesized complexes were prepared in (1:2) ratio correspond to (Co(II), Ni(II), Cu(II), Pd(II), Cd(II), Hg(II) and Pb(II) complexes while in case Cr(III) complex is
... Show More