This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding techniques within ANN. The results of the ANN were in sequence: 41.2813, 0.6914. The results of the ANN were in sequence 41.2813, 0.6914. These results provide insights into how well the hidden information is concealed within the image and the extent to which the visual integrity of the image is preserved.
This study has been undertaken to investigate the mineralogical properties and morphological features of sand fraction in some soils of Baghdad / Iraq.The morphological features of sand fractions were studied by Polarized optical microscope. Results have shown that the grains of these minerals from samples of sands have different colors, those from the surface horizons have dark brownish spots, due to staining by organic matter, and have a yellowish– to yellowish brown spots due to accumulation of Iron oxides.Results of light minerals indicated that quartz is dominant due to effect of parent material of these soils. Two types of opaque minerals (black and brown) are found, whereas t
The ground level ozone concentration at different locations in Baghdad city was identified. Five
different sites have been chosen to identify the ground level ozone concentration. Al- Dora and Al-
Za'afarania were chosen as areas contained point source ( power plant station ) in addition to high traffic
load , while Al –Uma park, Aden square and Al-Mawal square were chosen as area contained heavy
traffic only (line source). The measurement focuses on spring and fall because these periods display
favorable meteorology to ozone formation. During the research period the maximum values (peaks) for
ground level ozone concentration were observed at fall: at Al-Za'afarania area 101ppb as an average, at
Al-Dora 87 ppb as a
In the present work, radon gas concentrations in different surface soil samples in Baghdad governorate were measured using RAD-7 detector. The results have been shown that, the Radon gas concentrations ranged between (41.67±1.78Bq/m3), to (185.67±4.22Bq/m3), a map showing the distribution of the concentration of radon in selected areas was defined to identify areas with high pollution level. The reason for the high concentration of radon is that these surface soil samples are taken from agricultural areas. It is also known that fertilizers contain uranium levels as well as areas bombed in wars in the country. It is worth noting that all radon concentrations in Baghdad governorate are below the recommended minimum of 200-300Bq/m3) (Inte
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn the present study, a total of 245 flour samples were collected from 49 mills on both sides of Baghdad city (Al- Karkh and Al- Resafa), during the period from 1/6 - 1/12/ 2015 to detect the prolportion of iron added to the flour samples. It is found that only 45% of mills produced flour contain the prescribed percentage of iron (30-60 ppm) while 51.9% of the mills produced flour at rate is less or much more than the prescribed percentage, while only 4.1% of the mills were not added iron to the flour.
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreIdentifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration
... Show MoreSolar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so
... Show More