The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show MoreThis paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.
This paper includes the synthesis of some new nucleoside analogues starting with 2-substituted benzimidazole derivative (7-9), that synthesized by condensation of O-phenylenediamine with p-chloro benzaldehyde and two substituted benzoic acid , which on nucleophilic substitution with propargyl bromide gave a new N-substituted compounds (10-12). D-Fructose and D-galactose were chosen as a sugar moiety which were protected, brominated and azotated to give azido sugars (5) and (6), then they were subjected to 1,3-dipolar cycloaddition reaction with N-substuted compounds afforded bloked nucleoside analoges (13-16), which after hydrolysis gave our target the free nucleoside analogues (17-20). All prepared compounds were identified by FT-IR
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreMastitis is an udder tissue inflammation which has infected various species of animals. It happens through several types of pathogenic bacteria, particularly Streptococcus agalactiae. GBS is a leading cause of cow mastitis. In our sample, 9.52% of Streptococcus agalactiae were isolated which were collected from bovine mastic milk and identified by biochemical tests such as catalase, oxidase, Production of indole, fermentation of sugar, an examination of antibiotic sensitivity, CAMP test and group kits of Lancefield. The results showed that all Streptococcus agalactiae isolate was diagnosed by CAMP test by the appearance of the arrowhead in blood agar and by the appearance of visible agglutination on a card in the serological grouping kit of
... Show MoreTrickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z
... Show MoreCarbon nanotubes (CNTs) were synthesized via liquefied petroleum gas (LPG) as precursor using flame fragments deposition (FFD) technique. In vitro, biological activates of carbon nanotubes (CNTs) synthesized by FFD technique were investigated. The physiochemical characterizations of synthesized CNTs are similar to other synthesized CNTs and to the standard sample. Pharmaceutical application of synthesized CNTs was studied via conjugation and adsorption with different types of medicines as promote groups. The conjugation of CNTs was performed by adsorption the drugs such as sulfamethoxazole (SMX) and trimethoprim (TMP) on CNTs depending on physical properties of both bonded parts. The synthesized CNTs almost have the same performance in a
... Show MoreWater quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical